Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yAbf8Z3qA5.exe

Overview

General Information

Sample Name:yAbf8Z3qA5.exe
Analysis ID:557770
MD5:da3cb7622834a14916d498c1bd8a7827
SHA1:2179db1ae11496ee06b62dff337986316dd298ea
SHA256:78dd589c56a6d216f597f149bad69d510a88fb3257b4a643a7250381126d963c
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Connects to many ports of the same IP (likely port scanning)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • yAbf8Z3qA5.exe (PID: 6960 cmdline: "C:\Users\user\Desktop\yAbf8Z3qA5.exe" MD5: DA3CB7622834A14916D498C1BD8A7827)
    • schtasks.exe (PID: 5788 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • yAbf8Z3qA5.exe (PID: 6424 cmdline: {path} MD5: DA3CB7622834A14916D498C1BD8A7827)
    • yAbf8Z3qA5.exe (PID: 5964 cmdline: {path} MD5: DA3CB7622834A14916D498C1BD8A7827)
      • schtasks.exe (PID: 5884 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6807.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6340 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp6F7A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • yAbf8Z3qA5.exe (PID: 6476 cmdline: C:\Users\user\Desktop\yAbf8Z3qA5.exe 0 MD5: DA3CB7622834A14916D498C1BD8A7827)
    • schtasks.exe (PID: 5972 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp41AB.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • yAbf8Z3qA5.exe (PID: 6716 cmdline: {path} MD5: DA3CB7622834A14916D498C1BD8A7827)
  • dhcpmon.exe (PID: 4724 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: DA3CB7622834A14916D498C1BD8A7827)
    • schtasks.exe (PID: 6708 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp4BCD.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 3924 cmdline: {path} MD5: DA3CB7622834A14916D498C1BD8A7827)
    • dhcpmon.exe (PID: 5844 cmdline: {path} MD5: DA3CB7622834A14916D498C1BD8A7827)
  • dhcpmon.exe (PID: 6956 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: DA3CB7622834A14916D498C1BD8A7827)
    • schtasks.exe (PID: 240 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp6E1A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 6332 cmdline: {path} MD5: DA3CB7622834A14916D498C1BD8A7827)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 97 entries
      SourceRuleDescriptionAuthorStrings
      8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        8.2.yAbf8Z3qA5.exe.3ec9511.6.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        8.2.yAbf8Z3qA5.exe.3ec9511.6.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xd9ad:$x2: NanoCore.ClientPluginHost
        • 0xea88:$s4: PipeCreated
        • 0xd9c7:$s5: IClientLoggingHost
        Click to see the 80 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\yAbf8Z3qA5.exe, ProcessId: 5964, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\yAbf8Z3qA5.exe, ProcessId: 5964, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary

        barindex
        Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\yAbf8Z3qA5.exe" , ParentImage: C:\Users\user\Desktop\yAbf8Z3qA5.exe, ParentProcessId: 6960, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp, ProcessId: 5788

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\yAbf8Z3qA5.exe, ProcessId: 5964, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\yAbf8Z3qA5.exe, ProcessId: 5964, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: yAbf8Z3qA5.exeReversingLabs: Detection: 39%
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 39%
        Source: C:\Users\user\AppData\Roaming\BYTkrh.exeReversingLabs: Detection: 39%
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448108468.0000000003611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.460735897.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.461004523.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.472005093.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.471934462.00000000035F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448217064.0000000004611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTR
        Source: yAbf8Z3qA5.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\BYTkrh.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: 8.0.yAbf8Z3qA5.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.yAbf8Z3qA5.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.yAbf8Z3qA5.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.yAbf8Z3qA5.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.yAbf8Z3qA5.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.0.yAbf8Z3qA5.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpackAvira: Label: TR/NanoCore.fadte
        Source: yAbf8Z3qA5.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: yAbf8Z3qA5.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\Windows\77vrr.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.626720826.0000000002AE5000.00000004.00000040.sdmp
        Source: Binary string: indows\77vrr.pdbpdbvrr.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.626720826.0000000002AE5000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\kbdlgKkIwF\src\obj\Debug\77vrr.pdbL source: yAbf8Z3qA5.exe, 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000000.349004657.0000000000022000.00000002.00020000.sdmp, yAbf8Z3qA5.exe, 00000007.00000000.373054168.0000000000122000.00000002.00020000.sdmp, yAbf8Z3qA5.exe, 00000008.00000000.380229783.0000000000792000.00000002.00020000.sdmp, yAbf8Z3qA5.exe, 0000000C.00000002.430138618.0000000000F32000.00000002.00020000.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\user\Desktop\77vrr.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.626720826.0000000002AE5000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\kbdlgKkIwF\src\obj\Debug\77vrr.pdb source: yAbf8Z3qA5.exe, yAbf8Z3qA5.exe, 0000000C.00000002.430138618.0000000000F32000.00000002.00020000.sdmp, dhcpmon.exe
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 4x nop then mov esp, ebp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

        Networking

        barindex
        Source: global trafficTCP traffic: 185.19.85.175 ports 0,1,2,4,5,50421
        Source: global trafficTCP traffic: 197.210.64.245 ports 0,1,2,4,5,50421
        Source: unknownDNS query: name: strongodss.ddns.net
        Source: global trafficTCP traffic: 192.168.2.6:49755 -> 197.210.64.245:50421
        Source: global trafficTCP traffic: 192.168.2.6:49760 -> 185.19.85.175:50421
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: unknownTCP traffic detected without corresponding DNS query: 185.19.85.175
        Source: yAbf8Z3qA5.exe, 00000000.00000003.350523936.0000000004B19000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.354609078.0000000004B15000.00000004.00000001.sdmpString found in binary or memory: http://en.w
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: yAbf8Z3qA5.exe, 00000000.00000003.355947636.0000000004B4D000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.355902260.0000000004B4D000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.356028041.0000000004B4D000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: yAbf8Z3qA5.exe, 00000000.00000003.354635060.0000000004B17000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.354609078.0000000004B15000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com)
        Source: yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comala
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comm
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: yAbf8Z3qA5.exe, 00000000.00000003.358953165.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358983600.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358928287.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358873383.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358901732.0000000004B45000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html0
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: yAbf8Z3qA5.exe, 00000000.00000003.358506319.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358477439.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358532023.0000000004B45000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.353065872.0000000004B1B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: yAbf8Z3qA5.exe, 00000000.00000003.353084236.0000000004B15000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cny4i
        Source: yAbf8Z3qA5.exe, 00000000.00000003.360074854.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.360057596.0000000004B45000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/2
        Source: yAbf8Z3qA5.exe, 00000000.00000003.360074854.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.360057596.0000000004B45000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/4
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: yAbf8Z3qA5.exe, 00000000.00000003.355077180.0000000004B18000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: yAbf8Z3qA5.exe, 00000000.00000003.355077180.0000000004B18000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Fm
        Source: yAbf8Z3qA5.exe, 00000000.00000003.355077180.0000000004B18000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Negr
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.355930974.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.355896740.0000000004B45000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: yAbf8Z3qA5.exe, 00000000.00000003.355896740.0000000004B45000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comH
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.354609078.0000000004B15000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
        Source: unknownDNS traffic detected: queries for: strongodss.ddns.net
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D3026 WSARecv,
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448108468.0000000003611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.460735897.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.461004523.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.472005093.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.471934462.00000000035F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448217064.0000000004611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTR

        System Summary

        barindex
        Source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.5ba0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.2e81674.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.2e864f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.2e81674.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.5900000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.448108468.0000000003611000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.460735897.0000000002BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.461004523.0000000003BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.472005093.00000000045F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.471934462.00000000035F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.448217064.0000000004611000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: yAbf8Z3qA5.exe, Startup.csLong String: Length: 22528
        Source: BYTkrh.exe.0.dr, Startup.csLong String: Length: 22528
        Source: 0.0.yAbf8Z3qA5.exe.20000.0.unpack, Startup.csLong String: Length: 22528
        Source: 0.2.yAbf8Z3qA5.exe.20000.0.unpack, Startup.csLong String: Length: 22528
        Source: 7.2.yAbf8Z3qA5.exe.120000.0.unpack, Startup.csLong String: Length: 22528
        Source: 7.0.yAbf8Z3qA5.exe.120000.3.unpack, Startup.csLong String: Length: 22528
        Source: 7.0.yAbf8Z3qA5.exe.120000.0.unpack, Startup.csLong String: Length: 22528
        Source: 7.0.yAbf8Z3qA5.exe.120000.2.unpack, Startup.csLong String: Length: 22528
        Source: yAbf8Z3qA5.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.5ba0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.5ba0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.2e81674.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.2e81674.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.2e864f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.2e864f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.2e81674.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.2e81674.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.5900000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.5900000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.448108468.0000000003611000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.460735897.0000000002BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.461004523.0000000003BF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.472005093.00000000045F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.471934462.00000000035F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.448217064.0000000004611000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02312E91
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02311DA0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02312C19
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02310007
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02310070
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0231447C
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02312258
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02312248
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_023106B0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_023106A1
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_023116A8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02311698
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0231449F
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_023130D0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_023130C0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02311507
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02311D91
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04928840
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B9D8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_049277E8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04929700
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04927F30
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04924B66
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492A480
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B439
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492C42C
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B85A
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B448
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492A471
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B868
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04922112
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04921D50
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_049296FB
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B618
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0492B608
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_049277CE
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_04929B30
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B8D68
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B9968
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B3850
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B2FA8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B23A0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050BB638
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B306F
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_050B9A2F
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03271D20
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03272E11
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03271D0F
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03272B98
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03274398
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032721C8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032721D8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03270006
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03270070
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03273040
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03273050
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032706A1
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032716A8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032706B0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03271698
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03271CD0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C7F30
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C9700
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C77E8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB9D8
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C8840
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C7740
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C775E
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB608
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB618
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C96E1
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C76F7
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CC427
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB439
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB868
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CA47A
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB448
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CB85A
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032CA480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B9D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_01728840
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_017240F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_01724B66
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_01727F30
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_01729700
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_017277E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172A470
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B863
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B868
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172EC6D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B448
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B439
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172C42C
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172A480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_01727740
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172771D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B618
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172B608
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_017296EC
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F1D20
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F2E11
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F2B98
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F21D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F1D0F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F1698
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F16A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F06A1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F06B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F1CD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F0016
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F3040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F3050
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F0070
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D178E NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D1753 NtQuerySystemInformation,
        Source: yAbf8Z3qA5.exe, 00000000.00000002.388705528.0000000000162000.00000002.00020000.sdmpBinary or memory string: OriginalFilename77vrr.exe6 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000000.00000002.389586829.00000000027D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmpBinary or memory string: OriginalFilename77vrr.exe6 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000000.00000002.393671522.0000000006B00000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000000.00000003.364930637.0000000002CCA000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000000.00000002.393278734.00000000067D0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000000.00000002.390927325.00000000037D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000007.00000000.374768412.0000000000262000.00000002.00020000.sdmpBinary or memory string: OriginalFilename77vrr.exe6 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000000.378275741.00000000008D2000.00000002.00020000.sdmpBinary or memory string: OriginalFilename77vrr.exe6 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630937037.0000000006090000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 0000000C.00000002.439275846.00000000071D0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 0000000C.00000002.431278169.0000000001072000.00000002.00020000.sdmpBinary or memory string: OriginalFilename77vrr.exe6 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 0000000C.00000002.435607203.0000000004741000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 0000000C.00000003.401361631.0000000003C3A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 0000000C.00000002.433704504.0000000003741000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exe, 0000000C.00000002.439531181.00000000074F0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs yAbf8Z3qA5.exe
        Source: yAbf8Z3qA5.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: BYTkrh.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: yAbf8Z3qA5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: BYTkrh.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: yAbf8Z3qA5.exeReversingLabs: Detection: 39%
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile read: C:\Users\user\Desktop\yAbf8Z3qA5.exeJump to behavior
        Source: yAbf8Z3qA5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe "C:\Users\user\Desktop\yAbf8Z3qA5.exe"
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6807.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp6F7A.tmp
        Source: unknownProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe C:\Users\user\Desktop\yAbf8Z3qA5.exe 0
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp41AB.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp4BCD.tmp
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp6E1A.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6807.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp6F7A.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp41AB.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp4BCD.tmp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02300F02 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02300ECB AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D154E AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D1517 AdjustTokenPrivileges,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018E0E52 AdjustTokenPrivileges,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018E0E1B AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile created: C:\Users\user\AppData\Roaming\BYTkrh.exeJump to behavior
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFF62.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@32/10@10/2
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2152:120:WilError_01
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{60215651-75f6-4eb5-9240-aa39bd289f88}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1256:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2320:120:WilError_01
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: yAbf8Z3qA5.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: yAbf8Z3qA5.exeStatic file information: File size 1345024 > 1048576
        Source: yAbf8Z3qA5.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: yAbf8Z3qA5.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x13f000
        Source: yAbf8Z3qA5.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: yAbf8Z3qA5.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: C:\Windows\77vrr.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.626720826.0000000002AE5000.00000004.00000040.sdmp
        Source: Binary string: indows\77vrr.pdbpdbvrr.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.626720826.0000000002AE5000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\kbdlgKkIwF\src\obj\Debug\77vrr.pdbL source: yAbf8Z3qA5.exe, 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000000.349004657.0000000000022000.00000002.00020000.sdmp, yAbf8Z3qA5.exe, 00000007.00000000.373054168.0000000000122000.00000002.00020000.sdmp, yAbf8Z3qA5.exe, 00000008.00000000.380229783.0000000000792000.00000002.00020000.sdmp, yAbf8Z3qA5.exe, 0000000C.00000002.430138618.0000000000F32000.00000002.00020000.sdmp
        Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\user\Desktop\77vrr.pdb source: yAbf8Z3qA5.exe, 00000008.00000002.626720826.0000000002AE5000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\kbdlgKkIwF\src\obj\Debug\77vrr.pdb source: yAbf8Z3qA5.exe, yAbf8Z3qA5.exe, 0000000C.00000002.430138618.0000000000F32000.00000002.00020000.sdmp, dhcpmon.exe
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_023142AC push ebp; ret
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_0231428F push ebp; ret
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02310FB7 push edi; ret
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_03270FB7 push edi; ret
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 12_2_032C5500 push ebx; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_0172771D pushad ; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_018F0FB7 push edi; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.7042659795
        Source: initial sampleStatic PE information: section name: .text entropy: 7.7042659795
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile created: C:\Users\user\AppData\Roaming\BYTkrh.exeJump to dropped file
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeFile opened: C:\Users\user\Desktop\yAbf8Z3qA5.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 6476, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4724, type: MEMORYSTR
        Source: yAbf8Z3qA5.exe, 00000000.00000002.393928901.0000000006CAE000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 0000000C.00000002.439873858.000000000769E000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: yAbf8Z3qA5.exe, 00000000.00000002.393928901.0000000006CAE000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 0000000C.00000002.439873858.000000000769E000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exe TID: 7004Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exe TID: 5540Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exe TID: 5352Thread sleep time: -280000s >= -30000s
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exe TID: 4368Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3940Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02311507 rdtsc
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeWindow / User API: foregroundWindowGot 821
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D1276 GetSystemInfo,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 0000000F.00000002.454848113.000000000752E000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 0_2_02311507 rdtsc
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeMemory written: C:\Users\user\Desktop\yAbf8Z3qA5.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeMemory written: C:\Users\user\Desktop\yAbf8Z3qA5.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6807.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp6F7A.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp41AB.tmp
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeProcess created: C:\Users\user\Desktop\yAbf8Z3qA5.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmp4BCD.tmp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: yAbf8Z3qA5.exe, 00000008.00000002.627891290.00000000030E9000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.627110734.0000000002F06000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.627960850.0000000003100000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.627751384.0000000003088000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000008.00000002.628021533.0000000003115000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626426402.0000000001490000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626426402.0000000001490000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626426402.0000000001490000.00000002.00020000.sdmpBinary or memory string: &Program Manager
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626426402.0000000001490000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448108468.0000000003611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.460735897.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.461004523.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.472005093.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.471934462.00000000035F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448217064.0000000004611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: yAbf8Z3qA5.exe, 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: yAbf8Z3qA5.exe, 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: yAbf8Z3qA5.exe, 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: yAbf8Z3qA5.exe, 00000008.00000002.626822295.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.12.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.yAbf8Z3qA5.exe.d37e8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.cf8e8b8.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ebec9e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c6030d8.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.0.yAbf8Z3qA5.exe.400000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec3adb.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.yAbf8Z3qA5.exe.c5ce8b8.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.yAbf8Z3qA5.exe.3ec9511.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000001E.00000000.448894082.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.419515654.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.447649220.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448108468.0000000003611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.439620816.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.422995956.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.420229761.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.460735897.0000000002BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.461004523.0000000003BF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.437479878.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.459203730.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.440509698.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.444597183.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000000.418854563.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.472005093.00000000045F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.470493584.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000000.441490337.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.450070713.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.451069768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.471934462.00000000035F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.462617842.000000000C461000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.448217064.0000000004611000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 6960, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: yAbf8Z3qA5.exe PID: 5964, type: MEMORYSTR
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D2B6A bind,
        Source: C:\Users\user\Desktop\yAbf8Z3qA5.exeCode function: 8_2_051D2B3A bind,
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        1
        Access Token Manipulation
        2
        Masquerading
        11
        Input Capture
        211
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts112
        Process Injection
        1
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        Scheduled Task/Job
        21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Access Token Manipulation
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Ingress Tool Transfer
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script112
        Process Injection
        LSA Secrets1
        Remote System Discovery
        SSHKeyloggingData Transfer Size Limits1
        Non-Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureExfiltration Over C2 Channel11
        Application Layer Protocol
        Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items3
        Obfuscated Files or Information
        DCSync13
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 557770 Sample: yAbf8Z3qA5.exe Startdate: 21/01/2022 Architecture: WINDOWS Score: 100 52 strongodss.ddns.net 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 11 other signatures 2->60 9 yAbf8Z3qA5.exe 6 2->9         started        13 dhcpmon.exe 5 2->13         started        15 yAbf8Z3qA5.exe 4 2->15         started        signatures3 process4 file5 42 C:\Users\user\AppData\Roaming\BYTkrh.exe, PE32 9->42 dropped 44 C:\Users\user\AppData\Local\...\tmpFF62.tmp, XML 9->44 dropped 46 C:\Users\user\AppData\...\yAbf8Z3qA5.exe.log, ASCII 9->46 dropped 64 Uses schtasks.exe or at.exe to add and modify task schedules 9->64 66 Injects a PE file into a foreign processes 9->66 17 yAbf8Z3qA5.exe 1 14 9->17         started        22 schtasks.exe 1 9->22         started        24 yAbf8Z3qA5.exe 9->24         started        signatures6 process7 dnsIp8 48 185.19.85.175, 49760, 49765, 49767 DATAWIRE-ASCH Switzerland 17->48 50 strongodss.ddns.net 197.210.64.245, 49755, 49758, 49759 VCG-ASNG Nigeria 17->50 36 C:\Program Files (x86)\...\dhcpmon.exe, PE32 17->36 dropped 38 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 17->38 dropped 40 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 17->40 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->62 26 schtasks.exe 1 17->26         started        28 schtasks.exe 1 17->28         started        30 conhost.exe 22->30         started        file9 signatures10 process11 process12 32 conhost.exe 26->32         started        34 conhost.exe 28->34         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        yAbf8Z3qA5.exe40%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        yAbf8Z3qA5.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\BYTkrh.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe40%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\BYTkrh.exe40%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        SourceDetectionScannerLabelLinkDownload
        8.0.yAbf8Z3qA5.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.yAbf8Z3qA5.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.yAbf8Z3qA5.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.yAbf8Z3qA5.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.yAbf8Z3qA5.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.0.yAbf8Z3qA5.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.yAbf8Z3qA5.exe.5bb0000.10.unpack100%AviraTR/NanoCore.fadteDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.carterandcone.comala0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.sakkal.comH0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com)0%Avira URL Cloudsafe
        http://www.founder.com.cn/cny4i0%Avira URL Cloudsafe
        http://en.w0%URL Reputationsafe
        http://www.carterandcone.comm0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Negr0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Fm0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.galapagosdesign.com/20%Avira URL Cloudsafe
        http://www.galapagosdesign.com/40%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cno.0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        strongodss.ddns.net
        197.210.64.245
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                high
                http://www.carterandcone.comalayAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers/?yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.html0yAbf8Z3qA5.exe, 00000000.00000003.358953165.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358983600.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358928287.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358873383.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358901732.0000000004B45000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers?yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                      high
                      http://www.sakkal.comHyAbf8Z3qA5.exe, 00000000.00000003.355896740.0000000004B45000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.354609078.0000000004B15000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.kryAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comyAbf8Z3qA5.exe, 00000000.00000003.354635060.0000000004B17000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.354609078.0000000004B15000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.com)yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.founder.com.cn/cny4iyAbf8Z3qA5.exe, 00000000.00000003.353084236.0000000004B15000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://en.wyAbf8Z3qA5.exe, 00000000.00000003.350523936.0000000004B19000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.354609078.0000000004B15000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.commyAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/NegryAbf8Z3qA5.exe, 00000000.00000003.355077180.0000000004B18000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.comyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/FmyAbf8Z3qA5.exe, 00000000.00000003.355077180.0000000004B18000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.typography.netDyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.353065872.0000000004B1B000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlyAbf8Z3qA5.exe, 00000000.00000003.358506319.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358477439.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.358532023.0000000004B45000.00000004.00000001.sdmpfalse
                            high
                            http://www.galapagosdesign.com/2yAbf8Z3qA5.exe, 00000000.00000003.360074854.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.360057596.0000000004B45000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/4yAbf8Z3qA5.exe, 00000000.00000003.360074854.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.360057596.0000000004B45000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/yAbf8Z3qA5.exe, 00000000.00000003.355077180.0000000004B18000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cno.yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8yAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                              high
                              http://www.ascendercorp.com/typedesigners.htmlyAbf8Z3qA5.exe, 00000000.00000003.355947636.0000000004B4D000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.355902260.0000000004B4D000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.356028041.0000000004B4D000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.kryAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.353584518.0000000004B16000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comyAbf8Z3qA5.exe, 00000000.00000002.392850274.0000000005DA2000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.355930974.0000000004B45000.00000004.00000001.sdmp, yAbf8Z3qA5.exe, 00000000.00000003.355896740.0000000004B45000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                185.19.85.175
                                unknownSwitzerland
                                48971DATAWIRE-ASCHtrue
                                197.210.64.245
                                strongodss.ddns.netNigeria
                                29465VCG-ASNGfalse
                                Joe Sandbox Version:34.0.0 Boulder Opal
                                Analysis ID:557770
                                Start date:21.01.2022
                                Start time:16:16:25
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 14m 31s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:yAbf8Z3qA5.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:41
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@32/10@10/2
                                EGA Information:
                                • Successful, ratio: 80%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • TCP Packets have been reduced to 100
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                • Execution Graph export aborted for target yAbf8Z3qA5.exe, PID 6424 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report creation exceeded maximum time and may have missing behavior and disassembly information.
                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: yAbf8Z3qA5.exe
                                TimeTypeDescription
                                16:17:32API Interceptor809x Sleep call for process: yAbf8Z3qA5.exe modified
                                16:17:47Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\yAbf8Z3qA5.exe" s>$(Arg0)
                                16:17:47AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                16:17:50Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                16:17:52API Interceptor4x Sleep call for process: dhcpmon.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1345024
                                Entropy (8bit):7.685633845475471
                                Encrypted:false
                                SSDEEP:24576:KeZkjA8sCUrevlzuC6+iDUBQ2Kq1gekgwe0+U:lPCUczj/IYtKqq+F0+
                                MD5:DA3CB7622834A14916D498C1BD8A7827
                                SHA1:2179DB1AE11496EE06B62DFF337986316DD298EA
                                SHA-256:78DD589C56A6D216F597F149BAD69D510A88FB3257B4A643A7250381126D963C
                                SHA-512:88CA8D27EFB54EEB95278B6D4E92EF04E581362B2E110ABBB5E8F1BC715F0A6C1965AE5B52B567D45752F490B1FFE7188BD51672E8466F0160D7030DBBC4E68F
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 40%
                                Reputation:unknown
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.a..............P.............v.... ... ....@.. ....................................@.................................$...O.... ............................................................................... ............... ..H............text...|.... ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B................X.......H.......l[..p............-...............................................0............(....(..........(.....o.....*.....................(.......( ......(!......("......(#....*N..(....o{...($....*&..(%....*.s&........s'........s(........s)........s*........*....0...........~....o+....+..*.0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0..<........~.....(0.....,!r...p.....(1...o2...s3............~.....+..*.0......
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:unknown
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):0
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                Malicious:false
                                Reputation:unknown
                                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):664
                                Entropy (8bit):5.288448637977022
                                Encrypted:false
                                SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                Malicious:true
                                Reputation:unknown
                                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1651
                                Entropy (8bit):5.156446005056579
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB39Jtn:cbha7JlNQV/rydbz9I3YODOLNdq3z
                                MD5:1F1ED6DCB0690C7C70883B9C5407E7BA
                                SHA1:0BB3A61D72782A9CB28B5761334D05E946179B5D
                                SHA-256:327FAC04E79BC23D133642CDB0CAEE81C09FBC95DA0775F37365CCA63F2E74F9
                                SHA-512:1E475FF6C405B67871EFC616507777F8B962AAFA9F1DAF5BA309763B884CA9EC5972D483DD04A3CA89F89231A3D3BC8499CDC8DB95DE65A484E49E02FF27CBB2
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):0
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB39Jtn:cbha7JlNQV/rydbz9I3YODOLNdq3z
                                MD5:1F1ED6DCB0690C7C70883B9C5407E7BA
                                SHA1:0BB3A61D72782A9CB28B5761334D05E946179B5D
                                SHA-256:327FAC04E79BC23D133642CDB0CAEE81C09FBC95DA0775F37365CCA63F2E74F9
                                SHA-512:1E475FF6C405B67871EFC616507777F8B962AAFA9F1DAF5BA309763B884CA9EC5972D483DD04A3CA89F89231A3D3BC8499CDC8DB95DE65A484E49E02FF27CBB2
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1303
                                Entropy (8bit):5.115382657290805
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Vjujxtn:cbk4oL600QydbQxIYODOLedq3lj
                                MD5:299E78C1E1B6B7A33638B3585031F313
                                SHA1:7ED90F3F1DCA6AFB31BD276F375CCF8F910D396B
                                SHA-256:7D7A3F00F200FF08CD721FE52B539E76CB32B61427552C24F478E93A8F856E5C
                                SHA-512:D1D04F8AC16483FAC228A618B05C58852A7AE91A18DEB401FCBD270AA9AB6F62FAF687BEF38B0837D77EC61508458E3CBA5C50ADFF903526D80A2C736CFA8578
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):1310
                                Entropy (8bit):5.109425792877704
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1651
                                Entropy (8bit):5.156446005056579
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB39Jtn:cbha7JlNQV/rydbz9I3YODOLNdq3z
                                MD5:1F1ED6DCB0690C7C70883B9C5407E7BA
                                SHA1:0BB3A61D72782A9CB28B5761334D05E946179B5D
                                SHA-256:327FAC04E79BC23D133642CDB0CAEE81C09FBC95DA0775F37365CCA63F2E74F9
                                SHA-512:1E475FF6C405B67871EFC616507777F8B962AAFA9F1DAF5BA309763B884CA9EC5972D483DD04A3CA89F89231A3D3BC8499CDC8DB95DE65A484E49E02FF27CBB2
                                Malicious:true
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1345024
                                Entropy (8bit):7.685633845475471
                                Encrypted:false
                                SSDEEP:24576:KeZkjA8sCUrevlzuC6+iDUBQ2Kq1gekgwe0+U:lPCUczj/IYtKqq+F0+
                                MD5:DA3CB7622834A14916D498C1BD8A7827
                                SHA1:2179DB1AE11496EE06B62DFF337986316DD298EA
                                SHA-256:78DD589C56A6D216F597F149BAD69D510A88FB3257B4A643A7250381126D963C
                                SHA-512:88CA8D27EFB54EEB95278B6D4E92EF04E581362B2E110ABBB5E8F1BC715F0A6C1965AE5B52B567D45752F490B1FFE7188BD51672E8466F0160D7030DBBC4E68F
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 40%
                                Reputation:unknown
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.a..............P.............v.... ... ....@.. ....................................@.................................$...O.... ............................................................................... ............... ..H............text...|.... ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B................X.......H.......l[..p............-...............................................0............(....(..........(.....o.....*.....................(.......( ......(!......("......(#....*N..(....o{...($....*&..(%....*.s&........s'........s(........s)........s*........*....0...........~....o+....+..*.0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0..<........~.....(0.....,!r...p.....(1...o2...s3............~.....+..*.0......
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:Yn:Y
                                MD5:260CF674E1D2A820772E05F5F664454E
                                SHA1:5CA7793E2231AC24C380FA1319407CC9E5343F15
                                SHA-256:8EE13863FABB31C5847A2261EEAEB206BD218935970C03F99E57B6C1D247A3A9
                                SHA-512:FC5BFC372ABBF6C76B6C5F9BDDAB151ED49A266F867EC5CD5E6FF6B68E59C40B8DEDF53676B899E06D68368DEF381215BCC88E5DD6D6A6B90070D6A74D45E519
                                Malicious:true
                                Reputation:unknown
                                Preview:...<..H
                                Process:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):40
                                Entropy (8bit):4.361768795973195
                                Encrypted:false
                                SSDEEP:3:oNN2+WckHD9WYAC:oNN2Rcs9+C
                                MD5:8504094015EBA61D260077BE38F2111C
                                SHA1:5B65E0E790BE98B27BEC8410A30F677BCFF0204A
                                SHA-256:A8114F0BC6DA94929300F977D1A9CE21E7D6EBDE2A45DAD38DD24527428E4EB0
                                SHA-512:387ADC1C0479B0B4DF2A78D4E791F43C147D60B6B4C1C61E5B1B4013298280F7B29E3DBCF84F140E79433A6EC7957F6887164B95818BEF8E46DC13311F47F1F9
                                Malicious:false
                                Reputation:unknown
                                Preview:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.685633845475471
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:yAbf8Z3qA5.exe
                                File size:1345024
                                MD5:da3cb7622834a14916d498c1bd8a7827
                                SHA1:2179db1ae11496ee06b62dff337986316dd298ea
                                SHA256:78dd589c56a6d216f597f149bad69d510a88fb3257b4a643a7250381126d963c
                                SHA512:88ca8d27efb54eeb95278b6d4e92ef04e581362b2e110abbb5e8f1bc715f0a6c1965ae5b52b567d45752f490b1ffe7188bd51672e8466f0160d7030dbbc4e68f
                                SSDEEP:24576:KeZkjA8sCUrevlzuC6+iDUBQ2Kq1gekgwe0+U:lPCUczj/IYtKqq+F0+
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~.a..............P.............v.... ... ....@.. ....................................@................................
                                Icon Hash:6e6a42e0b0a4a90d
                                Entrypoint:0x540f76
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x61EA7EFF [Fri Jan 21 09:38:07 2022 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v2.0.50727
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x140f240x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1420000x9010.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x14c0000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x140dec0x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x13ef7c0x13f000False0.818539993143data7.7042659795IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0x1420000x90100x9200False0.611515410959data6.45284679846IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x14c0000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0x1421600x468GLS_BINARY_LSB_FIRST
                                RT_ICON0x1425d80x10a8data
                                RT_ICON0x1436900x25a8data
                                RT_ICON0x145c480x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
                                RT_GROUP_ICON0x149e800x3edata
                                RT_VERSION0x149ed00x314data
                                RT_MANIFEST0x14a1f40xe15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright 2013
                                Assembly Version1.0.0.0
                                InternalName77vrr.exe
                                FileVersion1.0.0.0
                                CompanyName
                                LegalTrademarks
                                Comments
                                ProductNameBattleShip
                                ProductVersion1.0.0.0
                                FileDescriptionBattleShip
                                OriginalFilename77vrr.exe
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                01/21/22-16:17:50.971618UDP254DNS SPOOF query response with TTL of 1 min. and no authority53620448.8.8.8192.168.2.6
                                01/21/22-16:17:57.271132UDP254DNS SPOOF query response with TTL of 1 min. and no authority53642678.8.8.8192.168.2.6
                                01/21/22-16:18:03.701058UDP254DNS SPOOF query response with TTL of 1 min. and no authority53494488.8.8.8192.168.2.6
                                01/21/22-16:18:39.178099UDP254DNS SPOOF query response with TTL of 1 min. and no authority53560618.8.8.8192.168.2.6
                                01/21/22-16:19:04.301739UDP254DNS SPOOF query response with TTL of 1 min. and no authority53496948.8.8.8192.168.2.6
                                01/21/22-16:19:10.447228UDP254DNS SPOOF query response with TTL of 1 min. and no authority53500108.8.8.8192.168.2.6
                                01/21/22-16:19:16.524506UDP254DNS SPOOF query response with TTL of 1 min. and no authority53637188.8.8.8192.168.2.6
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 21, 2022 16:17:51.072984934 CET4975550421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:51.218764067 CET5042149755197.210.64.245192.168.2.6
                                Jan 21, 2022 16:17:51.218902111 CET4975550421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:51.733867884 CET4975550421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:52.171371937 CET4975550421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:53.140212059 CET4975550421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:53.157457113 CET4975550421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:57.274210930 CET4975850421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:57.421838999 CET5042149758197.210.64.245192.168.2.6
                                Jan 21, 2022 16:17:57.424499989 CET4975850421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:57.921921968 CET4975850421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:58.466593981 CET4975850421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:17:59.391395092 CET4975850421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:03.815294027 CET4975950421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:03.961352110 CET5042149759197.210.64.245192.168.2.6
                                Jan 21, 2022 16:18:03.961550951 CET4975950421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:04.422511101 CET4975950421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:04.922487974 CET4975950421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:05.861016989 CET4975950421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:09.878415108 CET4976050421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:09.946851969 CET5042149760185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:10.454190969 CET4976050421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:10.532551050 CET5042149760185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:11.047961950 CET4976050421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:11.140558004 CET5042149760185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:15.174679041 CET4976550421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:15.267647028 CET5042149765185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:15.869158983 CET4976550421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:15.949668884 CET5042149765185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:16.626976013 CET4976550421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:16.710320950 CET5042149765185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:20.809263945 CET4976750421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:20.868350029 CET5042149767185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:21.470772982 CET4976750421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:21.547738075 CET5042149767185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:22.174002886 CET4976750421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:22.268377066 CET5042149767185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:26.466319084 CET4977450421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:26.611617088 CET5042149774197.210.64.245192.168.2.6
                                Jan 21, 2022 16:18:26.612207890 CET4977450421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:27.315038919 CET4977450421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:27.815181017 CET4977450421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:28.705729008 CET4977450421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:28.721959114 CET4977450421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:32.912208080 CET4977650421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:33.057452917 CET5042149776197.210.64.245192.168.2.6
                                Jan 21, 2022 16:18:33.058423996 CET4977650421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:33.492155075 CET4977650421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:33.909244061 CET4977650421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:34.768690109 CET4977650421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:34.865149021 CET4977650421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:39.183901072 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:39.329766989 CET5042149782197.210.64.245192.168.2.6
                                Jan 21, 2022 16:18:39.333028078 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:39.769150019 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:40.187252998 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:41.050555944 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:42.816245079 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:43.254746914 CET4978250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:18:47.275649071 CET4978950421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:47.389262915 CET5042149789185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:48.004471064 CET4978950421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:48.055279016 CET5042149789185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:48.613648891 CET4978950421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:48.655435085 CET5042149789185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:52.663012028 CET4979350421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:52.736879110 CET5042149793185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:53.317142010 CET4979350421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:53.379509926 CET5042149793185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:54.004715919 CET4979350421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:54.073517084 CET5042149793185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:58.302335024 CET4981050421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:58.388991117 CET5042149810185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:59.036577940 CET4981050421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:59.087620974 CET5042149810185.19.85.175192.168.2.6
                                Jan 21, 2022 16:18:59.640844107 CET4981050421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:18:59.742108107 CET5042149810185.19.85.175192.168.2.6
                                Jan 21, 2022 16:19:04.303606033 CET4982350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:04.448939085 CET5042149823197.210.64.245192.168.2.6
                                Jan 21, 2022 16:19:04.451667070 CET4982350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:04.945883989 CET4982350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:05.445226908 CET4982350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:06.327164888 CET4982350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:06.358948946 CET4982350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:10.448999882 CET4983250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:10.594268084 CET5042149832197.210.64.245192.168.2.6
                                Jan 21, 2022 16:19:10.597939968 CET4983250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:11.030746937 CET4983250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:11.452538967 CET4983250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:12.311923027 CET4983250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:12.452961922 CET4983250421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:16.526200056 CET4983350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:16.672190905 CET5042149833197.210.64.245192.168.2.6
                                Jan 21, 2022 16:19:16.672384024 CET4983350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:17.152721882 CET4983350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:17.577976942 CET4983350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:18.452989101 CET4983350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:19.204643011 CET4983350421192.168.2.6197.210.64.245
                                Jan 21, 2022 16:19:23.220956087 CET4983450421192.168.2.6185.19.85.175
                                Jan 21, 2022 16:19:23.331912994 CET5042149834185.19.85.175192.168.2.6
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 21, 2022 16:17:50.858752966 CET6204453192.168.2.68.8.8.8
                                Jan 21, 2022 16:17:50.971617937 CET53620448.8.8.8192.168.2.6
                                Jan 21, 2022 16:17:57.240945101 CET6426753192.168.2.68.8.8.8
                                Jan 21, 2022 16:17:57.271131992 CET53642678.8.8.8192.168.2.6
                                Jan 21, 2022 16:18:03.679944992 CET4944853192.168.2.68.8.8.8
                                Jan 21, 2022 16:18:03.701057911 CET53494488.8.8.8192.168.2.6
                                Jan 21, 2022 16:18:26.446173906 CET5838453192.168.2.68.8.8.8
                                Jan 21, 2022 16:18:26.463682890 CET53583848.8.8.8192.168.2.6
                                Jan 21, 2022 16:18:32.849071026 CET6026153192.168.2.68.8.8.8
                                Jan 21, 2022 16:18:32.866501093 CET53602618.8.8.8192.168.2.6
                                Jan 21, 2022 16:18:39.156146049 CET5606153192.168.2.68.8.8.8
                                Jan 21, 2022 16:18:39.178098917 CET53560618.8.8.8192.168.2.6
                                Jan 21, 2022 16:19:04.282772064 CET4969453192.168.2.68.8.8.8
                                Jan 21, 2022 16:19:04.301738977 CET53496948.8.8.8192.168.2.6
                                Jan 21, 2022 16:19:10.426218987 CET5001053192.168.2.68.8.8.8
                                Jan 21, 2022 16:19:10.447227955 CET53500108.8.8.8192.168.2.6
                                Jan 21, 2022 16:19:16.503427982 CET6371853192.168.2.68.8.8.8
                                Jan 21, 2022 16:19:16.524506092 CET53637188.8.8.8192.168.2.6
                                Jan 21, 2022 16:19:38.879863977 CET6211653192.168.2.68.8.8.8
                                Jan 21, 2022 16:19:38.897433996 CET53621168.8.8.8192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Jan 21, 2022 16:17:50.858752966 CET192.168.2.68.8.8.80xa512Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:17:57.240945101 CET192.168.2.68.8.8.80x2ed4Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:03.679944992 CET192.168.2.68.8.8.80x2acbStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:26.446173906 CET192.168.2.68.8.8.80x65f4Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:32.849071026 CET192.168.2.68.8.8.80xf095Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:39.156146049 CET192.168.2.68.8.8.80x9947Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:04.282772064 CET192.168.2.68.8.8.80xee39Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:10.426218987 CET192.168.2.68.8.8.80xc57bStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:16.503427982 CET192.168.2.68.8.8.80x53ebStandard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:38.879863977 CET192.168.2.68.8.8.80xbd07Standard query (0)strongodss.ddns.netA (IP address)IN (0x0001)
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Jan 21, 2022 16:17:50.971617937 CET8.8.8.8192.168.2.60xa512No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:17:57.271131992 CET8.8.8.8192.168.2.60x2ed4No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:03.701057911 CET8.8.8.8192.168.2.60x2acbNo error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:26.463682890 CET8.8.8.8192.168.2.60x65f4No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:32.866501093 CET8.8.8.8192.168.2.60xf095No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:18:39.178098917 CET8.8.8.8192.168.2.60x9947No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:04.301738977 CET8.8.8.8192.168.2.60xee39No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:10.447227955 CET8.8.8.8192.168.2.60xc57bNo error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:16.524506092 CET8.8.8.8192.168.2.60x53ebNo error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)
                                Jan 21, 2022 16:19:38.897433996 CET8.8.8.8192.168.2.60xbd07No error (0)strongodss.ddns.net197.210.64.245A (IP address)IN (0x0001)

                                Click to jump to process

                                Start time:16:17:25
                                Start date:21/01/2022
                                Path:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\yAbf8Z3qA5.exe"
                                Imagebase:0x20000
                                File size:1345024 bytes
                                MD5 hash:DA3CB7622834A14916D498C1BD8A7827
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.394239368.000000000C531000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Start time:16:17:35
                                Start date:21/01/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BYTkrh" /XML "C:\Users\user\AppData\Local\Temp\tmpFF62.tmp
                                Imagebase:0x1170000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Start time:16:17:36
                                Start date:21/01/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff61de10000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Start time:16:17:36
                                Start date:21/01/2022
                                Path:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0x120000
                                File size:1345024 bytes
                                MD5 hash:DA3CB7622834A14916D498C1BD8A7827
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Start time:16:17:38
                                Start date:21/01/2022
                                Path:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0x790000
                                File size:1345024 bytes
                                MD5 hash:DA3CB7622834A14916D498C1BD8A7827
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.630595587.0000000005BB0000.00000004.00020000.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.630568364.0000000005BA0000.00000004.00020000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.380197922.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.628097807.0000000003EB7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.380861261.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.630404786.0000000005900000.00000004.00020000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.623546911.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.378603204.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000008.00000000.383163459.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Start time:16:17:45
                                Start date:21/01/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6807.tmp
                                Imagebase:0x1170000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Start time:16:17:46
                                Start date:21/01/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff61de10000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Start time:16:17:47
                                Start date:21/01/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp6F7A.tmp
                                Imagebase:0x1170000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Start time:16:17:48
                                Start date:21/01/2022
                                Path:C:\Users\user\Desktop\yAbf8Z3qA5.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\yAbf8Z3qA5.exe 0
                                Imagebase:0xf30000
                                File size:1345024 bytes
                                MD5 hash:DA3CB7622834A14916D498C1BD8A7827
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.440223202.000000000D2E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Start time:16:17:48
                                Start date:21/01/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff61de10000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Start time:16:17:50
                                Start date:21/01/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                Imagebase:0xd60000
                                File size:1345024 bytes
                                MD5 hash:DA3CB7622834A14916D498C1BD8A7827
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.455188416.000000000CEF1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 40%, ReversingLabs
                                Reputation:low

                                No disassembly