Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
g9WPdiOMmP.exe

Overview

General Information

Sample Name:g9WPdiOMmP.exe
Analysis ID:623535
MD5:917e0e9eafc6cda73bff5d17ce4086cc
SHA1:4e89ea04a18e77490366413e1fd00249b4ecced5
SHA256:9e786734789a58b02fa6d10321f91833970cc44d86db086a4b456aa1f7d7f18b
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • g9WPdiOMmP.exe (PID: 7056 cmdline: "C:\Users\user\Desktop\g9WPdiOMmP.exe" MD5: 917E0E9EAFC6CDA73BFF5D17CE4086CC)
    • powershell.exe (PID: 6400 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 2176 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6044 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PCgOBjKh" /XML "C:\Users\user\AppData\Local\Temp\tmp502A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6720 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 4472 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
      • schtasks.exe (PID: 6936 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE651.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6812 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpEF7A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegSvcs.exe (PID: 6892 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0 MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6252 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6268 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 3292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "90fb62d1-4695-45ee-832f-da5694a0", "Group": "Default", "Domain1": "184.75.223.235", "Domain2": "", "Port": 3811, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1646:$x1: NanoCore.ClientPluginHost
0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x1646:$x2: NanoCore.ClientPluginHost
  • 0x1724:$s4: PipeCreated
  • 0x1660:$s5: IClientLoggingHost
0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x1690:$x2: NanoCore.ClientPlugin
  • 0x1646:$x3: NanoCore.ClientPluginHost
  • 0x16a6:$i3: IClientNetwork
  • 0x1660:$i6: IClientLoggingHost
  • 0x13df:$s1: ClientPlugin
  • 0x1699:$s1: ClientPlugin
0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 35 entries
    SourceRuleDescriptionAuthorStrings
    15.2.RegSvcs.exe.54d0000.7.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1646:$x1: NanoCore.ClientPluginHost
    15.2.RegSvcs.exe.54d0000.7.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x1646:$x2: NanoCore.ClientPluginHost
    • 0x1724:$s4: PipeCreated
    • 0x1660:$s5: IClientLoggingHost
    15.2.RegSvcs.exe.54d0000.7.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x1690:$x2: NanoCore.ClientPlugin
    • 0x1646:$x3: NanoCore.ClientPluginHost
    • 0x16a6:$i3: IClientNetwork
    • 0x1660:$i6: IClientLoggingHost
    • 0x13df:$s1: ClientPlugin
    • 0x1699:$s1: ClientPlugin
    15.0.RegSvcs.exe.400000.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    15.0.RegSvcs.exe.400000.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    Click to see the 98 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4472, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4472, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4472, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4472, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.5184.75.223.2354980938112025019 05/10/22-16:29:27.325942
    SID:2025019
    Source Port:49809
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354981238112025019 05/10/22-16:29:39.486310
    SID:2025019
    Source Port:49812
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980538112025019 05/10/22-16:29:13.562263
    SID:2025019
    Source Port:49805
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354978138112025019 05/10/22-16:28:27.857476
    SID:2025019
    Source Port:49781
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354978938112816766 05/10/22-16:28:38.861696
    SID:2816766
    Source Port:49789
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354979938112816766 05/10/22-16:28:53.595561
    SID:2816766
    Source Port:49799
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980638112816766 05/10/22-16:29:21.726244
    SID:2816766
    Source Port:49806
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980138112816718 05/10/22-16:28:59.924134
    SID:2816718
    Source Port:49801
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980338112025019 05/10/22-16:29:06.297654
    SID:2025019
    Source Port:49803
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354979938112025019 05/10/22-16:28:51.974527
    SID:2025019
    Source Port:49799
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354981338112025019 05/10/22-16:29:55.677533
    SID:2025019
    Source Port:49813
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354978938112025019 05/10/22-16:28:37.152636
    SID:2025019
    Source Port:49789
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980338112816766 05/10/22-16:29:08.157409
    SID:2816766
    Source Port:49803
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980538112816766 05/10/22-16:29:14.913941
    SID:2816766
    Source Port:49805
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:184.75.223.235192.168.2.53811498092841753 05/10/22-16:29:27.684225
    SID:2841753
    Source Port:3811
    Destination Port:49809
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354978138112816766 05/10/22-16:28:32.594863
    SID:2816766
    Source Port:49781
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354981238112816766 05/10/22-16:29:41.277572
    SID:2816766
    Source Port:49812
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354979238112025019 05/10/22-16:28:44.198677
    SID:2025019
    Source Port:49792
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980138112025019 05/10/22-16:28:59.097237
    SID:2025019
    Source Port:49801
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980638112025019 05/10/22-16:29:19.892387
    SID:2025019
    Source Port:49806
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:184.75.223.235192.168.2.53811498132841753 05/10/22-16:29:56.405286
    SID:2841753
    Source Port:3811
    Destination Port:49813
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354981138112816766 05/10/22-16:29:34.142910
    SID:2816766
    Source Port:49811
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354981138112025019 05/10/22-16:29:32.402001
    SID:2025019
    Source Port:49811
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354979238112816766 05/10/22-16:28:45.973981
    SID:2816766
    Source Port:49792
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.5184.75.223.2354980138112816766 05/10/22-16:29:01.025187
    SID:2816766
    Source Port:49801
    Destination Port:3811
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "90fb62d1-4695-45ee-832f-da5694a0", "Group": "Default", "Domain1": "184.75.223.235", "Domain2": "", "Port": 3811, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Source: g9WPdiOMmP.exeVirustotal: Detection: 56%Perma Link
    Source: g9WPdiOMmP.exeMetadefender: Detection: 22%Perma Link
    Source: g9WPdiOMmP.exeReversingLabs: Detection: 43%
    Source: 184.75.223.235Avira URL Cloud: Label: malware
    Source: 184.75.223.235Virustotal: Detection: 6%Perma Link
    Source: C:\Users\user\AppData\Roaming\PCgOBjKh.exeMetadefender: Detection: 22%Perma Link
    Source: C:\Users\user\AppData\Roaming\PCgOBjKh.exeReversingLabs: Detection: 43%
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTR
    Source: g9WPdiOMmP.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\PCgOBjKh.exeJoe Sandbox ML: detected
    Source: 15.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 15.2.RegSvcs.exe.6110000.8.unpackAvira: Label: TR/NanoCore.fadte
    Source: 15.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 15.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 15.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 15.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 15.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: g9WPdiOMmP.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
    Source: g9WPdiOMmP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: RegSvcs.pdb, source: dhcpmon.exe, 00000017.00000000.522377579.0000000000642000.00000002.00000001.01000000.0000000B.sdmp, dhcpmon.exe, 00000019.00000002.536255616.0000000000792000.00000002.00000001.01000000.0000000B.sdmp, dhcpmon.exe.15.dr
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 00000019.00000002.536255616.0000000000792000.00000002.00000001.01000000.0000000B.sdmp, dhcpmon.exe.15.dr

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49781 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49781 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49789 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49789 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49792 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49792 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49799 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49799 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49801 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49801 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49801 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49803 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49803 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49805 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49805 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49806 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49806 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49809 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 184.75.223.235:3811 -> 192.168.2.5:49809
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49811 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49811 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49812 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49812 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49813 -> 184.75.223.235:3811
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 184.75.223.235:3811 -> 192.168.2.5:49813
    Source: Malware configuration extractorURLs:
    Source: Malware configuration extractorURLs: 184.75.223.235
    Source: Joe Sandbox ViewASN Name: AMANAHA-NEWCA AMANAHA-NEWCA
    Source: global trafficTCP traffic: 192.168.2.5:49781 -> 184.75.223.235:3811
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: unknownTCP traffic detected without corresponding DNS query: 184.75.223.235
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: g9WPdiOMmP.exe, 00000000.00000002.503987328.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: g9WPdiOMmP.exe, 00000000.00000002.500932580.0000000000C80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: RegSvcs.exe, 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTR

    System Summary

    barindex
    Source: 15.2.RegSvcs.exe.54d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.54d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.3bf07fe.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.3bf07fe.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.52f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.52f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.2bd2058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.2bd2058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: g9WPdiOMmP.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
    Source: 15.2.RegSvcs.exe.54d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.54d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.54d0000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.3bf07fe.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.3bf07fe.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.3bf07fe.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.52f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.52f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.52f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.2bd2058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.2bd2058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.2bd2058.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.RegSvcs.exe.2bcd1f8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BC3340_2_027BC334
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BE7900_2_027BE790
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BE78B0_2_027BE78B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_00E6E48015_2_00E6E480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_00E6E47115_2_00E6E471
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_00E6BBD415_2_00E6BBD4
    Source: g9WPdiOMmP.exeBinary or memory string: OriginalFilename vs g9WPdiOMmP.exe
    Source: g9WPdiOMmP.exe, 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs g9WPdiOMmP.exe
    Source: g9WPdiOMmP.exe, 00000000.00000002.509325402.0000000006F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs g9WPdiOMmP.exe
    Source: g9WPdiOMmP.exe, 00000000.00000002.500932580.0000000000C80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs g9WPdiOMmP.exe
    Source: g9WPdiOMmP.exeBinary or memory string: OriginalFilenameDirectoryStr.exe2 vs g9WPdiOMmP.exe
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: g9WPdiOMmP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: PCgOBjKh.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: g9WPdiOMmP.exeVirustotal: Detection: 56%
    Source: g9WPdiOMmP.exeMetadefender: Detection: 22%
    Source: g9WPdiOMmP.exeReversingLabs: Detection: 43%
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeFile read: C:\Users\user\Desktop\g9WPdiOMmP.exeJump to behavior
    Source: g9WPdiOMmP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\g9WPdiOMmP.exe "C:\Users\user\Desktop\g9WPdiOMmP.exe"
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PCgOBjKh" /XML "C:\Users\user\AppData\Local\Temp\tmp502A.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE651.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpEF7A.tmp
    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PCgOBjKh" /XML "C:\Users\user\AppData\Local\Temp\tmp502A.tmpJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE651.tmp
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpEF7A.tmp
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeFile created: C:\Users\user\AppData\Roaming\PCgOBjKh.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp502A.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@26/22@0/1
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: 15.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 15.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 15.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 15.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3292:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_01
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMutant created: \Sessions\1\BaseNamedObjects\YBhJWSVHJNzDGrdhmB
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6000:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5144:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6456:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6828:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6796:120:WilError_01
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{90fb62d1-4695-45ee-832f-da5694a04e39}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_01
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: g9WPdiOMmP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: g9WPdiOMmP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: RegSvcs.pdb, source: dhcpmon.exe, 00000017.00000000.522377579.0000000000642000.00000002.00000001.01000000.0000000B.sdmp, dhcpmon.exe, 00000019.00000002.536255616.0000000000792000.00000002.00000001.01000000.0000000B.sdmp, dhcpmon.exe.15.dr
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: RegSvcs.exe, 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 00000019.00000002.536255616.0000000000792000.00000002.00000001.01000000.0000000B.sdmp, dhcpmon.exe.15.dr

    Data Obfuscation

    barindex
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.0.RegSvcs.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BF790 pushad ; iretd 0_2_027BFA91
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027B4210 push esp; retf 0004h0_2_027B4212
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027B40D9 push eax; retf 0004h0_2_027B40DA
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027B44C0 push edi; retf 0004h0_2_027B44C2
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027B453F push edi; retf 0004h0_2_027B4542
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027B6971 push 9F7004CAh; retf 0_2_027B6976
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027B6940 push 9DB004CAh; retf 0_2_027B694E
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BB2EF pushfd ; retf 0004h0_2_027BB2F2
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BB351 pushfd ; retf 0004h0_2_027BB352
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeCode function: 0_2_027BB417 pushfd ; retf 0004h0_2_027BB41A
    Source: initial sampleStatic PE information: section name: .text entropy: 7.86281198011
    Source: initial sampleStatic PE information: section name: .text entropy: 7.86281198011
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 15.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 15.0.RegSvcs.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 15.0.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 15.0.RegSvcs.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 15.0.RegSvcs.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 15.0.RegSvcs.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 15.0.RegSvcs.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeFile created: C:\Users\user\AppData\Roaming\PCgOBjKh.exeJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PCgOBjKh" /XML "C:\Users\user\AppData\Local\Temp\tmp502A.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 00000000.00000002.503987328.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTR
    Source: g9WPdiOMmP.exe, 00000000.00000002.503987328.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: g9WPdiOMmP.exe, 00000000.00000002.503987328.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exe TID: 7060Thread sleep time: -45733s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exe TID: 7084Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5156Thread sleep time: -17524406870024063s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6008Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5396Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1416Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5868Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6280Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1842Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2376Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6499
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3027
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 687
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeThread delayed: delay time: 45733Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
    Source: g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
    Source: g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 886008Jump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exe
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exe
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PCgOBjKh" /XML "C:\Users\user\AppData\Local\Temp\tmp502A.tmpJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE651.tmp
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpEF7A.tmp
    Source: RegSvcs.exe, 0000000F.00000002.703664629.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.702752905.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.706128660.000000000601B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: RegSvcs.exe, 0000000F.00000002.702752905.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagernHa
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Users\user\Desktop\g9WPdiOMmP.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
    Source: C:\Users\user\Desktop\g9WPdiOMmP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: g9WPdiOMmP.exe, 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: RegSvcs.exe, 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: RegSvcs.exe, 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: RegSvcs.exe, 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
    Source: RegSvcs.exe, 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: RegSvcs.exe, 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: RegSvcs.exe, 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: RegSvcs.exe, 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: RegSvcs.exe, 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf07fe.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6114629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bfb071.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.6110000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39e1328.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.RegSvcs.exe.3bf563b.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39764e8.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.g9WPdiOMmP.exe.39acb08.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: g9WPdiOMmP.exe PID: 7056, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4472, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    212
    Process Injection
    2
    Masquerading
    21
    Input Capture
    21
    Security Software Discovery
    Remote Services21
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Scheduled Task/Job
    11
    Disable or Modify Tools
    LSASS Memory2
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)1
    DLL Side-Loading
    21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)212
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items2
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
    DLL Side-Loading
    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 623535 Sample: g9WPdiOMmP.exe Startdate: 10/05/2022 Architecture: WINDOWS Score: 100 63 Snort IDS alert for network traffic 2->63 65 Multi AV Scanner detection for domain / URL 2->65 67 Found malware configuration 2->67 69 13 other signatures 2->69 8 g9WPdiOMmP.exe 7 2->8         started        12 RegSvcs.exe 2->12         started        14 dhcpmon.exe 2->14         started        16 dhcpmon.exe 2->16         started        process3 file4 53 C:\Users\user\AppData\Roaming\PCgOBjKh.exe, PE32 8->53 dropped 55 C:\Users\...\PCgOBjKh.exe:Zone.Identifier, ASCII 8->55 dropped 57 C:\Users\user\AppData\Local\...\tmp502A.tmp, XML 8->57 dropped 59 C:\Users\user\AppData\...\g9WPdiOMmP.exe.log, ASCII 8->59 dropped 73 Uses schtasks.exe or at.exe to add and modify task schedules 8->73 75 Writes to foreign memory regions 8->75 77 Adds a directory exclusion to Windows Defender 8->77 79 Injects a PE file into a foreign processes 8->79 18 RegSvcs.exe 8->18         started        23 powershell.exe 24 8->23         started        25 powershell.exe 25 8->25         started        33 2 other processes 8->33 27 conhost.exe 12->27         started        29 conhost.exe 14->29         started        31 conhost.exe 16->31         started        signatures5 process6 dnsIp7 61 184.75.223.235, 3811, 49781, 49789 AMANAHA-NEWCA Canada 18->61 49 C:\Users\user\AppData\Roaming\...\run.dat, data 18->49 dropped 51 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->51 dropped 71 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->71 35 schtasks.exe 18->35         started        37 schtasks.exe 18->37         started        39 conhost.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 33->43         started        file8 signatures9 process10 process11 45 conhost.exe 35->45         started        47 conhost.exe 37->47         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    g9WPdiOMmP.exe56%VirustotalBrowse
    g9WPdiOMmP.exe23%MetadefenderBrowse
    g9WPdiOMmP.exe44%ReversingLabsByteCode-MSIL.Trojan.Taskun
    g9WPdiOMmP.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\PCgOBjKh.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
    C:\Users\user\AppData\Roaming\PCgOBjKh.exe23%MetadefenderBrowse
    C:\Users\user\AppData\Roaming\PCgOBjKh.exe44%ReversingLabsByteCode-MSIL.Trojan.Taskun
    SourceDetectionScannerLabelLinkDownload
    15.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    15.2.RegSvcs.exe.6110000.8.unpack100%AviraTR/NanoCore.fadteDownload File
    15.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    15.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    15.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    15.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    15.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    0%Avira URL Cloudsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    184.75.223.2357%VirustotalBrowse
    184.75.223.235100%Avira URL Cloudmalware
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    true
    • Avira URL Cloud: safe
    low
    184.75.223.235true
    • 7%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.comg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designersGg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designers/?g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.founder.com.cn/cn/bTheg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.tiro.comg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.goodfont.co.krg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comlg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/cTheg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cng9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-jones.htmlg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8g9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fonts.comg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaseg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cng9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameg9WPdiOMmP.exe, 00000000.00000002.503987328.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, g9WPdiOMmP.exe, 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sakkal.comg9WPdiOMmP.exe, 00000000.00000002.508572949.0000000006882000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          184.75.223.235
                          unknownCanada
                          32489AMANAHA-NEWCAtrue
                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:623535
                          Start date and time: 10/05/202216:26:302022-05-10 16:26:30 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 13m 7s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:g9WPdiOMmP.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:36
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@26/22@0/1
                          EGA Information:
                          • Successful, ratio: 80%
                          HDC Information:
                          • Successful, ratio: 1.2% (good quality ratio 0.8%)
                          • Quality average: 55.8%
                          • Quality standard deviation: 41.8%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 48
                          • Number of non-executed functions: 3
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 52.152.110.14, 52.242.101.226, 20.223.24.244, 40.125.122.176
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                          • Execution Graph export aborted for target dhcpmon.exe, PID 6268 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          16:27:58API Interceptor1x Sleep call for process: g9WPdiOMmP.exe modified
                          16:28:06API Interceptor56x Sleep call for process: powershell.exe modified
                          16:28:19AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          16:28:23Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" s>$(Arg0)
                          16:28:25Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          16:28:25API Interceptor665x Sleep call for process: RegSvcs.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          184.75.223.235B2D2CD90962ED5916301604F6F423263C8F73A45DADAA.exeGet hashmaliciousBrowse
                            4682C806DD41AACCBB4F8BF3EAD4FD322C302F334E3ED.exeGet hashmaliciousBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              AMANAHA-NEWCASecuriteInfo.com.Variant.Zusy.422205.9544.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              SecuriteInfo.com.Variant.Zusy.422205.28942.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              Impgmovsnhntqqtzhgkvtxrejstmfscail.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              SecuriteInfo.com.Trojan.MalPack.18815.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              Yddkxdueywhkiefjlsbskdfpfrlwnkzdin.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              Gp2M1wXObH.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              Fkskaogxaausqqhwhvbrltmsasszsywdva.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              Hngvotwwxqrrqpozdzjwcpzajkixghmqfz.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              harmGet hashmaliciousBrowse
                              • 104.254.94.141
                              oJ3S21d1rfGet hashmaliciousBrowse
                              • 162.219.177.102
                              mirai.armGet hashmaliciousBrowse
                              • 162.219.177.248
                              B2D2CD90962ED5916301604F6F423263C8F73A45DADAA.exeGet hashmaliciousBrowse
                              • 184.75.223.235
                              4682C806DD41AACCBB4F8BF3EAD4FD322C302F334E3ED.exeGet hashmaliciousBrowse
                              • 184.75.223.235
                              WXTSOH1fd2Get hashmaliciousBrowse
                              • 184.75.219.227
                              Mtxymgiuvaqhsnvczideuhnykrfdxiosoz.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              t4hwIvRdgG.exeGet hashmaliciousBrowse
                              • 184.75.221.171
                              RSec.x86Get hashmaliciousBrowse
                              • 104.245.146.193
                              Facturas_cliente900693_21.exeGet hashmaliciousBrowse
                              • 172.94.127.185
                              arBO1d8fBL.exeGet hashmaliciousBrowse
                              • 104.254.90.235
                              credit.exeGet hashmaliciousBrowse
                              • 104.254.90.235
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exef8keZ8QG3Lw4Vvy.exeGet hashmaliciousBrowse
                                Request for Quotation.exeGet hashmaliciousBrowse
                                  Purchase Order.exeGet hashmaliciousBrowse
                                    Profoma Invoice.exeGet hashmaliciousBrowse
                                      NEW Order.exeGet hashmaliciousBrowse
                                        SecuriteInfo.com.W32.AIDetectNet.01.25700.exeGet hashmaliciousBrowse
                                          Payment Details xls.exeGet hashmaliciousBrowse
                                            debit note#U6a21#U677f#Uff08USD75455.92#U3001USD200000#U3001USD150124.53#Uff09.exeGet hashmaliciousBrowse
                                              Request for Quotation (2).exeGet hashmaliciousBrowse
                                                VEL-P01225013B.exeGet hashmaliciousBrowse
                                                  SOA.exeGet hashmaliciousBrowse
                                                    Dq6Qlhi724.exeGet hashmaliciousBrowse
                                                      VEL-P01225013B.exeGet hashmaliciousBrowse
                                                        TT Copy.exeGet hashmaliciousBrowse
                                                          RFQ#1952022(BOQ-IT-Equipment.pdf.exeGet hashmaliciousBrowse
                                                            PO#7A68D20.exeGet hashmaliciousBrowse
                                                              Bank Slip.exeGet hashmaliciousBrowse
                                                                outstanding invoices.exeGet hashmaliciousBrowse
                                                                  Bank slip 0003.exeGet hashmaliciousBrowse
                                                                    Antawise.pdf.exeGet hashmaliciousBrowse
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):45152
                                                                      Entropy (8bit):6.149629800481177
                                                                      Encrypted:false
                                                                      SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                      MD5:2867A3817C9245F7CF518524DFD18F28
                                                                      SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                      SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                      SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Joe Sandbox View:
                                                                      • Filename: f8keZ8QG3Lw4Vvy.exe, Detection: malicious, Browse
                                                                      • Filename: Request for Quotation.exe, Detection: malicious, Browse
                                                                      • Filename: Purchase Order.exe, Detection: malicious, Browse
                                                                      • Filename: Profoma Invoice.exe, Detection: malicious, Browse
                                                                      • Filename: NEW Order.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.W32.AIDetectNet.01.25700.exe, Detection: malicious, Browse
                                                                      • Filename: Payment Details xls.exe, Detection: malicious, Browse
                                                                      • Filename: debit note#U6a21#U677f#Uff08USD75455.92#U3001USD200000#U3001USD150124.53#Uff09.exe, Detection: malicious, Browse
                                                                      • Filename: Request for Quotation (2).exe, Detection: malicious, Browse
                                                                      • Filename: VEL-P01225013B.exe, Detection: malicious, Browse
                                                                      • Filename: SOA.exe, Detection: malicious, Browse
                                                                      • Filename: Dq6Qlhi724.exe, Detection: malicious, Browse
                                                                      • Filename: VEL-P01225013B.exe, Detection: malicious, Browse
                                                                      • Filename: TT Copy.exe, Detection: malicious, Browse
                                                                      • Filename: RFQ#1952022(BOQ-IT-Equipment.pdf.exe, Detection: malicious, Browse
                                                                      • Filename: PO#7A68D20.exe, Detection: malicious, Browse
                                                                      • Filename: Bank Slip.exe, Detection: malicious, Browse
                                                                      • Filename: outstanding invoices.exe, Detection: malicious, Browse
                                                                      • Filename: Bank slip 0003.exe, Detection: malicious, Browse
                                                                      • Filename: Antawise.pdf.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):142
                                                                      Entropy (8bit):5.090621108356562
                                                                      Encrypted:false
                                                                      SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                      MD5:8C0458BB9EA02D50565175E38D577E35
                                                                      SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                      SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                      SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                      Malicious:false
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):142
                                                                      Entropy (8bit):5.090621108356562
                                                                      Encrypted:false
                                                                      SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                      MD5:8C0458BB9EA02D50565175E38D577E35
                                                                      SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                      SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                      SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                      Malicious:false
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                      Process:C:\Users\user\Desktop\g9WPdiOMmP.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):1308
                                                                      Entropy (8bit):5.345811588615766
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                      Malicious:true
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):22152
                                                                      Entropy (8bit):5.600629014897279
                                                                      Encrypted:false
                                                                      SSDEEP:384:FtCDLq0bbii/H9kzO3ISYZEjultI/l7nvjg3hIn8ML+SfmAV7chk+5ZQvnI++t0:xi/d5YpKClts166XKmp4+H
                                                                      MD5:350D47B1EB9FFC9B3AC2BAD168B795DC
                                                                      SHA1:C31C84B9EB7960212073775294774248D91E903A
                                                                      SHA-256:CB96F9DE8E7FEF846033381DCC14423C884B0965A5347EE086A521A90948FD88
                                                                      SHA-512:A92ABE5F100D07FF6B6BB47C0D50335BF285E660F4687983E96A5164A3F7307FF1DC649FAA78E93CDAC9C0DF4BDEC7B499A1549EFD32943D0643C65C0573F5C0
                                                                      Malicious:false
                                                                      Preview:@...e...........[.......H.~...............+..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview:1
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview:1
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview:1
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview:1
                                                                      Process:C:\Users\user\Desktop\g9WPdiOMmP.exe
                                                                      File Type:XML 1.0 document, ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):1599
                                                                      Entropy (8bit):5.132854386445681
                                                                      Encrypted:false
                                                                      SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtKxvn:cgeCaYrFdOFzOzN33ODOiDdKrsuTev
                                                                      MD5:8CB6DA50A3A05F3E30D5FBECA9ED8386
                                                                      SHA1:61AD8CC8EE6E5C2DE8893DDE2FDF078958C5A0ED
                                                                      SHA-256:E6EB520F4AF34ADECA6094C327F2F5336DC6ABCBA1C5BEE926D2849305D03028
                                                                      SHA-512:AD000B811CF463BD8B14B947DD6C805862382CA49388440341137A2C9DF781E17FF099F8B912586A7CE1556131D956A3CA648E39883AF6345808BCAB062B2FC5
                                                                      Malicious:true
                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1320
                                                                      Entropy (8bit):5.135668813522653
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mXxtn:cbk4oL600QydbQxIYODOLedq3ZXj
                                                                      MD5:8CAD1B41587CED0F1E74396794F31D58
                                                                      SHA1:11054BF74FCF5E8E412768035E4DAE43AA7B710F
                                                                      SHA-256:3086D914F6B23268F8A12CB1A05516CD5465C2577E1D1E449F1B45C8E5E8F83C
                                                                      SHA-512:99C2EF89029DE51A866DF932841684B7FC912DF21E10E2DD0D09E400203BBDC6CBA6319A31780B7BF8B286D2CEA8EA3FC7D084348BF2F002AB4F5A34218CCBEF
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1310
                                                                      Entropy (8bit):5.109425792877704
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                      MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                      SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                      SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                      SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):248
                                                                      Entropy (8bit):7.094528505897445
                                                                      Encrypted:false
                                                                      SSDEEP:6:X4LDAnybgCFcpJSQwP4d7r3l3TmKEt5mT1DhFtMhXvvHOxHB3GDq:X4LEnybgCFCtvd7bl3ThE4T19FtMhXvs
                                                                      MD5:061E700FE27D852034A5A44BF5985CCF
                                                                      SHA1:15B072DE6D6FDD92AE36F074345FA41985833E8D
                                                                      SHA-256:4BBB88AF530693EB4A710B0591D4BAF585837242C5690F5A821BF2FC9CC587CD
                                                                      SHA-512:CF6C5458AB50C859740490985D1E7E887D1116F3FA947FF2EC49AF9997A42F3402C63EF42B93498544195D9859FBB19CCC295966564B30F5ADB4A36D4E8886C6
                                                                      Malicious:false
                                                                      Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL....f.Z#.|...@HkG....G..O*V..........pz...."....r...w&&|..c..3}~.....~...os..f.......4..1.gJ.'.d".L...A.t...F.{....C.|&.w
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8
                                                                      Entropy (8bit):3.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:NJl:R
                                                                      MD5:CD7C5012299C4E12645782EBBA5F15CC
                                                                      SHA1:0C1DAB18BEAF663A2561EBB77D817F085239C862
                                                                      SHA-256:B91EE3F0082FECF09C0C5203F1444E9BFAACDD14EEC73967903DBA8A86D67633
                                                                      SHA-512:B7191A9AE0DAE7E55DD3D56E0FAE5733B7905982DFCF8C99DBF2F9C86242B8497CCC598ABAE59E5EF6AEC093F52AF01AA30F27D0BF050C3DBFA9CC8F8C9D6355
                                                                      Malicious:true
                                                                      Preview:.T...2.H
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):57
                                                                      Entropy (8bit):4.830795005765378
                                                                      Encrypted:false
                                                                      SSDEEP:3:oMty8WddSWA1KMNn:oMLW6WA1j
                                                                      MD5:08E799E8E9B4FDA648F2500A40A11933
                                                                      SHA1:AC76B5E20DED247803448A2F586731ED7D84B9F3
                                                                      SHA-256:D46E34924067EB071D1F031C0BC015F4B711EDCE64D8AE00F24F29E73ECB71DB
                                                                      SHA-512:5C5701A86156D573BE274E73615FD6236AC89630714863A4CB2639EEC8EC1BE746839EBF8A9AEBA0A9BE326AF6FA02D8F9BD7A93D3FFB139BADE945572DF5FE9
                                                                      Malicious:false
                                                                      Preview:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Process:C:\Users\user\Desktop\g9WPdiOMmP.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):550400
                                                                      Entropy (8bit):7.853052744252165
                                                                      Encrypted:false
                                                                      SSDEEP:12288:2zAoru8S+bng0orc61SJcDwW0PWEtFhL1DoQ4L:2x5crcncDuxDa
                                                                      MD5:917E0E9EAFC6CDA73BFF5D17CE4086CC
                                                                      SHA1:4E89EA04A18E77490366413E1FD00249B4ECCED5
                                                                      SHA-256:9E786734789A58B02FA6D10321F91833970CC44D86DB086A4B456AA1F7D7F18B
                                                                      SHA-512:4918F789103FA6E76EA4D89ADB622D647F31C7AE167C99F8BD9EAC27AE554B9BA5C51C4136B5F0017E4EEABD8D3B86F8FE58E40921B94A6B1A3C8BD8026FD1F4
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: Metadefender, Detection: 23%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 44%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ntxb..............0..\...........z... ........@.. ....................................@..................................y..K.................................................................................... ............... ..H............text...4Z... ...\.................. ..`.rsrc................^..............@..@.reloc...............d..............@..B.................z......H............X......v....!...V...........................................0..j.......8W.......E........8....8....8.......}....8.......}....8......*.... ....(....9....& ....8.............8.......0..e.......88.......E....C...8>......}.... ....(....9....&8........8.............8....8....8.......}....8......*....0..e.......8,.......E....6...81......}....8.......}....8.............8........8......*8.... ....(....9....&8........0..j.......8@.......E........8........83......}.... ...
                                                                      Process:C:\Users\user\Desktop\g9WPdiOMmP.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):5791
                                                                      Entropy (8bit):5.395004252689085
                                                                      Encrypted:false
                                                                      SSDEEP:96:BZv/0NUqDo1ZFZO/0NUqDo1ZbcC0jZD/0NUqDo1ZlpkkVZe:W
                                                                      MD5:A2A93E74A1BC3D62D3C9C23959056338
                                                                      SHA1:4869FBF2D1B141C36CB2822C0C9828667A85BB5F
                                                                      SHA-256:3DEFA30C7A1F90FCAE6992E4874939C2E9B0F97D2F4B333F049D3B8B98A46365
                                                                      SHA-512:0C479A6C69E7A83A396101589614539172334EE405C7E453EA80A17B77C6067F86960E2F6ABEEA56E60E6A19C8D83467210C40916B658359C511730FE66E2286
                                                                      Malicious:false
                                                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510162808..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 468325 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\PCgOBjKh.exe..Process ID: 2176..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510162808..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\PCgOBjKh.exe..**********************..Windows PowerShell transcript start..Start time: 20220510163138..Username: computer\user..RunAs User: computer\alf
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):5767
                                                                      Entropy (8bit):5.384831662667496
                                                                      Encrypted:false
                                                                      SSDEEP:96:BZs/0N0EFqDo1ZfEkZQ/0N0EFqDo1Zu4EH+EHQEHjZQ/0N0EFqDo1Zr5EHAEHAEm:S
                                                                      MD5:C781F61924BCFFA01E599F41A02E2639
                                                                      SHA1:4F3868B92C266642DB30E2C533C8C2E0A71B72DC
                                                                      SHA-256:22E3B965505FC316B0922CA94D70D731495016E54308AE636F116BC46B459520
                                                                      SHA-512:06C10BA7E109AAF25A1D915D1D03A65535A94AF3C8D64B8ED092EF38F5FB15D42BAD65DD3D86F81E22DCBF9BB147ADDA1D847D2E69D914075D9F6C8705F91CED
                                                                      Malicious:false
                                                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220510162805..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 468325 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\Desktop\g9WPdiOMmP.exe..Process ID: 6400..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220510162805..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\Desktop\g9WPdiOMmP.exe..**********************..Windows PowerShell transcript start..Start time: 20220510163125..Username: computer\user..RunAs User: computer\user..Configu
                                                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1141
                                                                      Entropy (8bit):4.44831826838854
                                                                      Encrypted:false
                                                                      SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                      MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                      SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                      SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                      SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                      Malicious:false
                                                                      Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.853052744252165
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      File name:g9WPdiOMmP.exe
                                                                      File size:550400
                                                                      MD5:917e0e9eafc6cda73bff5d17ce4086cc
                                                                      SHA1:4e89ea04a18e77490366413e1fd00249b4ecced5
                                                                      SHA256:9e786734789a58b02fa6d10321f91833970cc44d86db086a4b456aa1f7d7f18b
                                                                      SHA512:4918f789103fa6e76ea4d89adb622d647f31c7ae167c99f8bd9eac27ae554b9ba5c51c4136b5f0017e4eeabd8d3b86f8fe58e40921b94a6b1a3c8bd8026fd1f4
                                                                      SSDEEP:12288:2zAoru8S+bng0orc61SJcDwW0PWEtFhL1DoQ4L:2x5crcncDuxDa
                                                                      TLSH:F4C4121DF7EFD512D1A81A77D0D5550403B59982BA13EB2B2CCB328619037DF8E82F9A
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ntxb..............0..\...........z... ........@.. ....................................@................................
                                                                      Icon Hash:00828e8e8686b000
                                                                      Entrypoint:0x487a2e
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x6278746E [Mon May 9 01:54:54 2022 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x879e00x4b.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x5b8.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x85a340x85c00False0.923364485981data7.86281198011IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x880000x5b80x600False0.425130208333data4.09213985155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x8a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x880a00x32cdata
                                                                      RT_MANIFEST0x883cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightCopyright 2014
                                                                      Assembly Version1.0.0.0
                                                                      InternalNameDirectoryStr.exe
                                                                      FileVersion1.0.0.0
                                                                      CompanyName
                                                                      LegalTrademarks
                                                                      Comments
                                                                      ProductNameOversikt
                                                                      ProductVersion1.0.0.0
                                                                      FileDescriptionOversikt
                                                                      OriginalFilenameDirectoryStr.exe
                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      192.168.2.5184.75.223.2354980938112025019 05/10/22-16:29:27.325942TCP2025019ET TROJAN Possible NanoCore C2 60B498093811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354981238112025019 05/10/22-16:29:39.486310TCP2025019ET TROJAN Possible NanoCore C2 60B498123811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980538112025019 05/10/22-16:29:13.562263TCP2025019ET TROJAN Possible NanoCore C2 60B498053811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354978138112025019 05/10/22-16:28:27.857476TCP2025019ET TROJAN Possible NanoCore C2 60B497813811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354978938112816766 05/10/22-16:28:38.861696TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497893811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354979938112816766 05/10/22-16:28:53.595561TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497993811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980638112816766 05/10/22-16:29:21.726244TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498063811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980138112816718 05/10/22-16:28:59.924134TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon498013811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980338112025019 05/10/22-16:29:06.297654TCP2025019ET TROJAN Possible NanoCore C2 60B498033811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354979938112025019 05/10/22-16:28:51.974527TCP2025019ET TROJAN Possible NanoCore C2 60B497993811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354981338112025019 05/10/22-16:29:55.677533TCP2025019ET TROJAN Possible NanoCore C2 60B498133811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354978938112025019 05/10/22-16:28:37.152636TCP2025019ET TROJAN Possible NanoCore C2 60B497893811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980338112816766 05/10/22-16:29:08.157409TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498033811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980538112816766 05/10/22-16:29:14.913941TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498053811192.168.2.5184.75.223.235
                                                                      184.75.223.235192.168.2.53811498092841753 05/10/22-16:29:27.684225TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)381149809184.75.223.235192.168.2.5
                                                                      192.168.2.5184.75.223.2354978138112816766 05/10/22-16:28:32.594863TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497813811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354981238112816766 05/10/22-16:29:41.277572TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498123811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354979238112025019 05/10/22-16:28:44.198677TCP2025019ET TROJAN Possible NanoCore C2 60B497923811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980138112025019 05/10/22-16:28:59.097237TCP2025019ET TROJAN Possible NanoCore C2 60B498013811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980638112025019 05/10/22-16:29:19.892387TCP2025019ET TROJAN Possible NanoCore C2 60B498063811192.168.2.5184.75.223.235
                                                                      184.75.223.235192.168.2.53811498132841753 05/10/22-16:29:56.405286TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)381149813184.75.223.235192.168.2.5
                                                                      192.168.2.5184.75.223.2354981138112816766 05/10/22-16:29:34.142910TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498113811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354981138112025019 05/10/22-16:29:32.402001TCP2025019ET TROJAN Possible NanoCore C2 60B498113811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354979238112816766 05/10/22-16:28:45.973981TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497923811192.168.2.5184.75.223.235
                                                                      192.168.2.5184.75.223.2354980138112816766 05/10/22-16:29:01.025187TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498013811192.168.2.5184.75.223.235
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      May 10, 2022 16:28:26.845132113 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:27.202249050 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:27.202400923 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:27.857475996 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:28.221658945 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:28.223398924 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:28.782270908 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:28.782347918 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:29.143345118 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:29.143492937 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:29.742455006 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:31.569048882 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:31.971219063 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:31.971390009 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:31.971486092 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.330822945 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.330950022 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.331049919 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.331279039 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.331424952 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.331490993 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.594862938 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.689232111 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.689371109 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.690958023 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.691032887 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.691170931 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.691215038 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.691410065 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.691453934 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.691694021 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.691746950 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.691957951 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.692007065 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.692084074 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.692126036 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.692255020 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:32.692301989 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:32.735924006 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.046914101 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.046993017 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.049067974 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.049170971 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.049310923 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.049370050 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.049529076 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.049624920 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.049778938 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.049843073 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.050077915 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.050137043 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.050354004 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.050406933 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.050421953 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.050450087 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.050662041 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.050725937 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.050970078 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.051031113 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.051129103 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.051193953 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.051346064 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.051405907 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.051522970 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.051585913 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.051774025 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.051834106 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.052052021 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.052109003 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:33.052573919 CEST381149781184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:33.052637100 CEST497813811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:36.795509100 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:37.151928902 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:37.152060032 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:37.152636051 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:37.516292095 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:37.516625881 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:37.873346090 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:37.873433113 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:38.437017918 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:38.437207937 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:38.861453056 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:38.861551046 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:38.861696005 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.218859911 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.218888044 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.218974113 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.219136953 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.219460011 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.219510078 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.575650930 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.576105118 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.576179981 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.576320887 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.576680899 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.576746941 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.576977015 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.577106953 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.577171087 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.577306986 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.577697039 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.577764034 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.760010004 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.933095932 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.933176041 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.933263063 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.933320045 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.933475971 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.933528900 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.933777094 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.933826923 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.933934927 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.933989048 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.934545040 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.934607983 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.934662104 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.934711933 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.934827089 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.934880018 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.935554981 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.935602903 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.935621977 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.935655117 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.935687065 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.935736895 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.935761929 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.935810089 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.935935020 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.935987949 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.936160088 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.936213017 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.936420918 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.936486006 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:39.936533928 CEST381149789184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:39.936587095 CEST497893811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:43.839131117 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:44.197614908 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:44.197729111 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:44.198677063 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:44.567528963 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:44.589246988 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:44.945873022 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:44.947341919 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:45.567727089 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:45.567833900 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:45.973767996 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:45.973803043 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:45.973980904 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.330799103 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.330857038 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.331003904 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.331137896 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.334861994 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.334976912 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.688137054 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.688159943 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.688257933 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.688621044 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.688641071 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.688736916 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.692626953 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.692837000 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.692961931 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.693062067 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.693550110 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:46.693653107 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:46.857786894 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:47.046077013 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046112061 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046128035 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046144962 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046205997 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046227932 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046526909 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.046729088 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.052221060 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:47.055644989 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.055843115 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.056114912 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.056370974 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.056569099 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.056833029 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.057163954 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.057229042 CEST381149792184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:47.060009956 CEST497923811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:51.259126902 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:51.617747068 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:51.630599022 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:51.974526882 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:52.337033033 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:52.346541882 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:52.704189062 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:52.705363035 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:53.333272934 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:53.595561028 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:54.153141022 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:54.401571989 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:54.639955044 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:54.852906942 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:54.852945089 CEST381149799184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:54.853024960 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:54.853080034 CEST497993811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:58.739774942 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:59.096386909 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:59.096502066 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:59.097237110 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:59.475116014 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:59.514619112 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:59.556997061 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:28:59.921241999 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:28:59.924134016 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:00.533493042 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:00.586229086 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.025105000 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.025130987 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.025187016 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.027970076 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.383153915 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.383483887 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.383553982 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.387140989 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.387375116 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.387444019 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.741722107 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.741790056 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.741916895 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.742224932 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.742286921 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.742353916 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.745326996 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.745572090 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.745656967 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.745877028 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.746081114 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:01.746140003 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:01.844290018 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.103935957 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.104054928 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.104176044 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.104234934 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.104415894 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.104480028 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.104655981 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.104717970 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.104907036 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.104963064 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.105159044 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.105225086 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.105293989 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.105346918 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.105495930 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.105546951 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.105838060 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.105884075 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.106015921 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.106065989 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.106298923 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.106380939 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.106494904 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.106547117 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.119304895 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.119365931 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.119414091 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.119456053 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.119662046 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.119716883 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:02.119915009 CEST381149801184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:02.119967937 CEST498013811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:05.941401005 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:06.296601057 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:06.296750069 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:06.297653913 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:06.665400982 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:06.666714907 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:07.028254032 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:07.028548956 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:07.584038973 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:08.157408953 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:08.784895897 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:08.785131931 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:09.147540092 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:09.210272074 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:09.210433006 CEST381149803184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:09.210496902 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:09.210537910 CEST498033811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:13.182900906 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:13.560934067 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:13.561207056 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:13.562263012 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:13.932467937 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:13.936888933 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:14.293886900 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:14.375268936 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:14.481587887 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:14.913721085 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:14.913929939 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:14.913940907 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:14.913986921 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.274736881 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.276021957 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.276071072 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.276156902 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.276355028 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.276439905 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.516345978 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.635986090 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.636286020 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.636358023 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.636617899 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.636668921 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.636863947 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.636928082 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.637012959 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.637056112 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.637262106 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.637305975 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:15.639410019 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.639441967 CEST381149805184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:15.639543056 CEST498053811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:19.533241034 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:19.889780045 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:19.891540051 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:19.892386913 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:20.254832983 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:20.267510891 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:20.625591040 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:20.625691891 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:21.262227058 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:21.296505928 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:21.726130962 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:21.726243973 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:21.728410006 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:21.728523016 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.094635963 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.096276045 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.097255945 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.097354889 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.098579884 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.099984884 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.481766939 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481818914 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481832027 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481847048 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481858969 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481870890 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481889009 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.481901884 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.482049942 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.728046894 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.857404947 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.857634068 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.857801914 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.857845068 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.857906103 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.859786034 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.859807014 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.859869957 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.859896898 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.859987020 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.860028982 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.860085011 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.860357046 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.860410929 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.860414028 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.860455990 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.860719919 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.860814095 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.860970974 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.861027002 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:22.861188889 CEST381149806184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:22.861242056 CEST498063811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:26.960374117 CEST498093811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:27.324877977 CEST381149809184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:27.325002909 CEST498093811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:27.325942039 CEST498093811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:27.684225082 CEST381149809184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:27.876357079 CEST498093811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:28.023672104 CEST498093811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:28.238514900 CEST381149809184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:28.238667011 CEST498093811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:32.041819096 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:32.401284933 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:32.401385069 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:32.402000904 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:32.766379118 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:32.766653061 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:33.124823093 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:33.125009060 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:33.692522049 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:33.695050955 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.142755032 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.142873049 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.142910004 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.142935038 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.508184910 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.508431911 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.508539915 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.508605957 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.508889914 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.508943081 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.866277933 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.866446972 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.866539955 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.866662979 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.867084026 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.867145061 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.867489100 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.867535114 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.867558956 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.867587090 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:34.867784977 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:34.867841005 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.111757040 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.227725983 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.227788925 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.227916956 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.227953911 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.228161097 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.228203058 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.228434086 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.228477001 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.228645086 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.228687048 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.229099035 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.229155064 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.229203939 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.229243994 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.229273081 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.229310036 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.229500055 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.229537964 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.229778051 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.229819059 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.230050087 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.230101109 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.230431080 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.230457067 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.230487108 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.230520010 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.230676889 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.230731964 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.230892897 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.230941057 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:35.231194973 CEST381149811184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:35.231247902 CEST498113811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:39.128696918 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:39.485671043 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:39.485819101 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:39.486310005 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:39.849215031 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:39.849870920 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:40.207390070 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:40.252456903 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:40.297899961 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:40.860321999 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:40.860450983 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.277411938 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.277439117 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.277571917 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.279611111 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.635396957 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.635560989 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.635700941 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.637134075 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.637394905 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.637644053 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.993662119 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.993715048 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.993787050 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.993937016 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.994208097 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.994260073 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.995256901 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.995497942 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.995610952 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:41.995744944 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.996223927 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:41.996275902 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.237962008 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.352332115 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.352441072 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.352510929 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.352540016 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.352641106 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.352756023 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.352938890 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.353009939 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.353148937 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.353209019 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.353471994 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.353542089 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.353547096 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.353634119 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.353786945 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.353960991 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.354094028 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.354192019 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.354316950 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.354397058 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.354765892 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.354790926 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.354842901 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.354917049 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.354967117 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.355036020 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.355233908 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.355314016 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.355439901 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.355530024 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:42.355675936 CEST381149812184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:42.355779886 CEST498123811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:46.254276037 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:49.268829107 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:55.363179922 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:55.676364899 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:55.676502943 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:55.677532911 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:56.044949055 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:56.045176983 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:56.405286074 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:56.566340923 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:56.926994085 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:56.927891016 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:57.384985924 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:57.385236979 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:57.386219978 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:57.748012066 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:57.748265982 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:57.748326063 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:57.748573065 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:57.748770952 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:57.748814106 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.111959934 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112207890 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112236023 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112261057 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.112262964 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112318993 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.112551928 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112829924 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112881899 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.112883091 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.113181114 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.113254070 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.473120928 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.473227978 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.473339081 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.473500013 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.473715067 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.473773956 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.473943949 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.474215984 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.474271059 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.474338055 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.474558115 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.474608898 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.474828005 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.475116014 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.475169897 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.475339890 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.475445032 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.475487947 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.484011889 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.484220028 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.484318972 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.484411001 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.484780073 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.484853983 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.833782911 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.833811045 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.833842039 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.833909988 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.834253073 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.834309101 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.834497929 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.834513903 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.834539890 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.834558010 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.834896088 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.835089922 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.835124969 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.835700035 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.835758924 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.835956097 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.836137056 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.836204052 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.836371899 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.836776972 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.836813927 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.836853981 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.836886883 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.836932898 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.837213039 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.837462902 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.837521076 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.837693930 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.837863922 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.837912083 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.838418961 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.838768959 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.838824034 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.838973999 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.839250088 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.839308023 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.844846010 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.844954967 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.845066071 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.845294952 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.845503092 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.845561981 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.847310066 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.847502947 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.847569942 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:58.847739935 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.847978115 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:58.848030090 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.194721937 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.194977999 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.195065975 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.195096970 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.195463896 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.195529938 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.195656061 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.196032047 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.196109056 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.196113110 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.196286917 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.196342945 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.196505070 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.196742058 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.196803093 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.196989059 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.197144985 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.197206974 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.197422028 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.197803974 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.197858095 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.197906017 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.198179960 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.198240042 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.198630095 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.198652983 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.198721886 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.198728085 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.199347973 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.199429035 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.199455976 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.199484110 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.199534893 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.199575901 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.200344086 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.200387001 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.200419903 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.200428963 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.200460911 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.200670958 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.200903893 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.200973988 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.201049089 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.201303005 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.201349020 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.201500893 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.201749086 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.201798916 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.202003956 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.202092886 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.202135086 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.202379942 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.202578068 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.202637911 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.202857018 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.203217983 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.203249931 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.203270912 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.203493118 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.203543901 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.203849077 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.204013109 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.204056978 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.204205990 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.204600096 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.204649925 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.204659939 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.204854965 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.204906940 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.205096960 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.205372095 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.205431938 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.205600023 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.254050016 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.555932999 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.556015015 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.556026936 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.556057930 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.556303024 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.556365967 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.556545019 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.556600094 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.557929993 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.558012009 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.558161974 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.558212042 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.558377028 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.558429003 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.558629036 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.558691025 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.558903933 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.558962107 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.559120893 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.559176922 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.560152054 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.560231924 CEST498133811192.168.2.5184.75.223.235
                                                                      May 10, 2022 16:29:59.560379028 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.560445070 CEST381149813184.75.223.235192.168.2.5
                                                                      May 10, 2022 16:29:59.560483932 CEST498133811192.168.2.5184.75.223.235

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:16:27:41
                                                                      Start date:10/05/2022
                                                                      Path:C:\Users\user\Desktop\g9WPdiOMmP.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\g9WPdiOMmP.exe"
                                                                      Imagebase:0x430000
                                                                      File size:550400 bytes
                                                                      MD5 hash:917E0E9EAFC6CDA73BFF5D17CE4086CC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.506248784.0000000003976000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.503987328.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.502039179.0000000002821000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Target ID:5
                                                                      Start time:16:28:02
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\g9WPdiOMmP.exe
                                                                      Imagebase:0x230000
                                                                      File size:430592 bytes
                                                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:high

                                                                      Target ID:7
                                                                      Start time:16:28:02
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:8
                                                                      Start time:16:28:03
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PCgOBjKh.exe
                                                                      Imagebase:0x230000
                                                                      File size:430592 bytes
                                                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:high

                                                                      Target ID:9
                                                                      Start time:16:28:03
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:10
                                                                      Start time:16:28:04
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PCgOBjKh" /XML "C:\Users\user\AppData\Local\Temp\tmp502A.tmp
                                                                      Imagebase:0xd10000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:11
                                                                      Start time:16:28:06
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:14
                                                                      Start time:16:28:12
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Imagebase:0x160000
                                                                      File size:45152 bytes
                                                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:15
                                                                      Start time:16:28:14
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Imagebase:0x6b0000
                                                                      File size:45152 bytes
                                                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000F.00000002.705979579.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.698928477.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000F.00000002.705922722.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.703857941.0000000003BA9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000F.00000002.706208848.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.499485179.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.498430598.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.499086679.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000000.498709574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.701504359.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high

                                                                      Target ID:16
                                                                      Start time:16:28:20
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE651.tmp
                                                                      Imagebase:0xd10000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:17
                                                                      Start time:16:28:21
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      Target ID:19
                                                                      Start time:16:28:22
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpEF7A.tmp
                                                                      Imagebase:0xd10000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      Target ID:20
                                                                      Start time:16:28:23
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 0
                                                                      Imagebase:0xee0000
                                                                      File size:45152 bytes
                                                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET

                                                                      Target ID:21
                                                                      Start time:16:28:23
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      Target ID:22
                                                                      Start time:16:28:24
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      Target ID:23
                                                                      Start time:16:28:26
                                                                      Start date:10/05/2022
                                                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                                                      Imagebase:0x640000
                                                                      File size:45152 bytes
                                                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Antivirus matches:
                                                                      • Detection: 0%, Metadefender, Browse
                                                                      • Detection: 0%, ReversingLabs

                                                                      Target ID:24
                                                                      Start time:16:28:27
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      Target ID:25
                                                                      Start time:16:28:28
                                                                      Start date:10/05/2022
                                                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                                                      Imagebase:0x790000
                                                                      File size:45152 bytes
                                                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET

                                                                      Target ID:26
                                                                      Start time:16:28:29
                                                                      Start date:10/05/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff77f440000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:13.1%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:87
                                                                        Total number of Limit Nodes:5
                                                                        execution_graph 10173 27b94b8 10176 27b95b0 10173->10176 10174 27b94c7 10177 27b95c3 10176->10177 10178 27b95d3 10177->10178 10180 27b9838 10177->10180 10178->10174 10181 27b984c 10180->10181 10183 27b9871 10181->10183 10184 27b8920 10181->10184 10183->10178 10185 27b9a18 LoadLibraryExW 10184->10185 10187 27b9a91 10185->10187 10187->10183 10202 27b40e8 10203 27b40fa 10202->10203 10204 27b4108 10203->10204 10208 27b4217 10203->10208 10213 27b3c7c 10204->10213 10206 27b4102 10209 27b4220 10208->10209 10217 27b430f 10209->10217 10221 27b4310 10209->10221 10214 27b3c87 10213->10214 10229 27b5864 10214->10229 10216 27b6abc 10216->10206 10219 27b4337 10217->10219 10218 27b4414 10219->10218 10225 27b3e58 10219->10225 10222 27b4337 10221->10222 10223 27b4414 10222->10223 10224 27b3e58 CreateActCtxA 10222->10224 10224->10223 10226 27b53a0 CreateActCtxA 10225->10226 10228 27b5463 10226->10228 10230 27b586f 10229->10230 10233 27b5884 10230->10233 10232 27b6c55 10232->10216 10234 27b588f 10233->10234 10237 27b58b4 10234->10237 10236 27b6d3a 10236->10232 10238 27b58bf 10237->10238 10241 27b58e4 10238->10241 10240 27b6e2a 10240->10236 10243 27b58ef 10241->10243 10242 27b757c 10242->10240 10243->10242 10245 27bb5e8 10243->10245 10246 27bb609 10245->10246 10247 27bb62d 10246->10247 10251 27bb798 10246->10251 10255 27bb797 10246->10255 10259 27bb767 10246->10259 10247->10242 10252 27bb7a5 10251->10252 10253 27bb7df 10252->10253 10264 27ba24c 10252->10264 10253->10247 10256 27bb7a5 10255->10256 10257 27ba24c LoadLibraryExW 10256->10257 10258 27bb7df 10256->10258 10257->10258 10258->10247 10260 27bb76b 10259->10260 10261 27bb7b3 10259->10261 10260->10247 10262 27bb7df 10261->10262 10263 27ba24c LoadLibraryExW 10261->10263 10262->10247 10263->10262 10265 27ba257 10264->10265 10267 27bc4d8 10265->10267 10268 27bc074 10265->10268 10267->10267 10269 27bc07f 10268->10269 10270 27b58e4 LoadLibraryExW 10269->10270 10271 27bc547 10270->10271 10275 27be2c8 10271->10275 10281 27be2b7 10271->10281 10272 27bc580 10272->10267 10277 27be345 10275->10277 10278 27be2f9 10275->10278 10276 27be305 10276->10272 10277->10272 10278->10276 10279 27be748 LoadLibraryExW 10278->10279 10280 27be747 LoadLibraryExW 10278->10280 10279->10277 10280->10277 10283 27be2c8 10281->10283 10282 27be305 10282->10272 10283->10282 10284 27be748 LoadLibraryExW 10283->10284 10285 27be747 LoadLibraryExW 10283->10285 10284->10282 10285->10282 10188 27bb8b0 10189 27bb916 10188->10189 10190 27bb9c5 10189->10190 10192 27bba70 10189->10192 10195 27ba2d4 10192->10195 10196 27bbad8 DuplicateHandle 10195->10196 10197 27bba9e 10196->10197 10197->10190 10198 27b9790 10199 27b97d8 GetModuleHandleW 10198->10199 10200 27b97d2 10198->10200 10201 27b9805 10199->10201 10200->10199

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 27b3e58-27b5461 CreateActCtxA 3 27b546a-27b54c4 0->3 4 27b5463-27b5469 0->4 11 27b54d3-27b54d7 3->11 12 27b54c6-27b54c9 3->12 4->3 13 27b54d9-27b54e5 11->13 14 27b54e8 11->14 12->11 13->14 16 27b54e9 14->16 16->16
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 027B5451
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: afb02f4ef0f127678103f46ca3adf1cca6ea4d982bbf028a7804c642b71a1d83
                                                                        • Instruction ID: e59f374d814a1d37a022d8ec5c75a916b8ed585e0acb62685f721970201fb8b3
                                                                        • Opcode Fuzzy Hash: afb02f4ef0f127678103f46ca3adf1cca6ea4d982bbf028a7804c642b71a1d83
                                                                        • Instruction Fuzzy Hash: 0241EFB1D00618CBDB25CFA9C8447DEBBB6BF48308F60856AD409BB251DBB46946CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 17 27b539f-27b5461 CreateActCtxA 19 27b546a-27b54c4 17->19 20 27b5463-27b5469 17->20 27 27b54d3-27b54d7 19->27 28 27b54c6-27b54c9 19->28 20->19 29 27b54d9-27b54e5 27->29 30 27b54e8 27->30 28->27 29->30 32 27b54e9 30->32 32->32
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 027B5451
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: a92df915daa158e7a65458075af7ba48ae2b2617ddcd608d889e092bc219aa8c
                                                                        • Instruction ID: 3380b09bad01034924418860c5d708ebed0d61fbbe7c1de5b2fcbe6370f2096c
                                                                        • Opcode Fuzzy Hash: a92df915daa158e7a65458075af7ba48ae2b2617ddcd608d889e092bc219aa8c
                                                                        • Instruction Fuzzy Hash: D941D1B1C00618CBDB24CFA9C8847DEFBB6BF48308F60856AD409BB251DB756946CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 33 27ba2d4-27bbb6c DuplicateHandle 35 27bbb6e-27bbb74 33->35 36 27bbb75-27bbb92 33->36 35->36
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,027BBA9E,?,?,?,?,?), ref: 027BBB5F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 72949257a7a42d36c0344a58a34e98d62040262e2f03b796abadac074a70c1df
                                                                        • Instruction ID: 7f1bd92e795a4cf40c71c7fa3d00cd9a38b6f913cb6363e990a3c936e8a5238d
                                                                        • Opcode Fuzzy Hash: 72949257a7a42d36c0344a58a34e98d62040262e2f03b796abadac074a70c1df
                                                                        • Instruction Fuzzy Hash: 6421D4B59002089FDB10CFAAD584ADEFBF9EF48324F14845AE915B7210D374A954CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 39 27b8920-27b9a58 41 27b9a5a-27b9a5d 39->41 42 27b9a60-27b9a8f LoadLibraryExW 39->42 41->42 43 27b9a98-27b9ab5 42->43 44 27b9a91-27b9a97 42->44 44->43
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,027B9871,00000800,00000000,00000000), ref: 027B9A82
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: d20c9cce41bd9a50d5c4e611206fee228f42c29a5d1cbeabc4665d9368b60713
                                                                        • Instruction ID: b31e089e960c2ff621a8aacab7131b787cf543e4fcded5d8312ea75598195b21
                                                                        • Opcode Fuzzy Hash: d20c9cce41bd9a50d5c4e611206fee228f42c29a5d1cbeabc4665d9368b60713
                                                                        • Instruction Fuzzy Hash: E111C2B6900209DFDB10CF9AC444BDEFBF9AF49624F14842AE629B7200C375A545CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 53 27b9790-27b97d0 54 27b97d8-27b9803 GetModuleHandleW 53->54 55 27b97d2-27b97d5 53->55 56 27b980c-27b9820 54->56 57 27b9805-27b980b 54->57 55->54 57->56
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 027B97F6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: ff1461aff689b2868b01f377f744557609f0c3783bdabd773c5d65b6fbd702a7
                                                                        • Instruction ID: be19933c52e41e6df1d0d40ce3b13642b5f0f32cc0edf45fb0e8551f26673fa8
                                                                        • Opcode Fuzzy Hash: ff1461aff689b2868b01f377f744557609f0c3783bdabd773c5d65b6fbd702a7
                                                                        • Instruction Fuzzy Hash: 51110FB6C00649CFCB20CF9AC444BDEFBF8AF88224F14846AD529B7600D374A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 47 27b978f-27b97d0 48 27b97d8-27b9803 GetModuleHandleW 47->48 49 27b97d2-27b97d5 47->49 50 27b980c-27b9820 48->50 51 27b9805-27b980b 48->51 49->48 51->50
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 027B97F6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: a33ff9bda988b9461073b07036838edd4c3abd337a09ba642d799b478eaadea9
                                                                        • Instruction ID: 4c8637ebaf21a64a3242be9f386d8bcc8c48cee404ce99f0899b794a87db8f03
                                                                        • Opcode Fuzzy Hash: a33ff9bda988b9461073b07036838edd4c3abd337a09ba642d799b478eaadea9
                                                                        • Instruction Fuzzy Hash: 3D110FB6C00649CFCB20CF9AD444BDEFBF4AF88224F14846AD529B7600D374A546CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.500925349.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_c7d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8bc118c65937b23fc86222dbb48cb02bf72c04758439bc9e1c989e79821dec91
                                                                        • Instruction ID: 87702733dee47cb7d5df84ca180d9b7ff7b06cc40d123ca842142f4727a072eb
                                                                        • Opcode Fuzzy Hash: 8bc118c65937b23fc86222dbb48cb02bf72c04758439bc9e1c989e79821dec91
                                                                        • Instruction Fuzzy Hash: B22125B1504240DFCB55DF50D9C4B26BFB6FF88328F24C669E80A0B246C336D956CBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501314019.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_f1d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c645dba418803e2cf3206c5f464b1220a4507b504926daa3beee135460791270
                                                                        • Instruction ID: e465cf01ad485ed6965ce4e09b7de8e104d78f4cce378aa1cefda7105a21140a
                                                                        • Opcode Fuzzy Hash: c645dba418803e2cf3206c5f464b1220a4507b504926daa3beee135460791270
                                                                        • Instruction Fuzzy Hash: A4212975904284EFDB05DF50D9C4BA6BBB5FB84324F34CA6DD8094B242C33AD886DB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501314019.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_f1d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 21972273822b349e32757ed876f4793545180aa07f8fe55dd94bf6fa95f44498
                                                                        • Instruction ID: 3ede9903b730899db2c30de80067f66d3653adc62cc4cc4cdfcd60182cebe892
                                                                        • Opcode Fuzzy Hash: 21972273822b349e32757ed876f4793545180aa07f8fe55dd94bf6fa95f44498
                                                                        • Instruction Fuzzy Hash: 5D210776504244DFCB14DF14D8C4B66BBB5FB88324F24C969D8094B24AC33AD887DB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501314019.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_f1d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cba5aa5b583f31545af836b8b78a6986e99dfcff3823d4e043b229a448475b26
                                                                        • Instruction ID: a6e10752cf3ee15b5c13dc08ed927ac9cdaed9308e85671528f0e1cc4e4c945d
                                                                        • Opcode Fuzzy Hash: cba5aa5b583f31545af836b8b78a6986e99dfcff3823d4e043b229a448475b26
                                                                        • Instruction Fuzzy Hash: C821B0754093C08FCB12CF24C990B51BF71EB46324F28C1EAC8498B297C33A984ACB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.500925349.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_c7d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6ad262f7e262abacbff50db4dee8e87071a2daebf469680c606094787e0e2c0d
                                                                        • Instruction ID: e153c61d4bd4c42725d99304c1ac56831e083b41548bd098d35cd85d94782115
                                                                        • Opcode Fuzzy Hash: 6ad262f7e262abacbff50db4dee8e87071a2daebf469680c606094787e0e2c0d
                                                                        • Instruction Fuzzy Hash: 4F11B1B6404280CFCB12CF10D5C4B16BF71FF84324F24C6A9D8490B656C33AD95ACBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501314019.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_f1d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e0bec74287bdcffcdfa7599285f44322ef2adb2956973c470928046ed4a726d0
                                                                        • Instruction ID: b63c037f369020be4cb247077e3461ec08394f5ab66da572a515b92f753ca91c
                                                                        • Opcode Fuzzy Hash: e0bec74287bdcffcdfa7599285f44322ef2adb2956973c470928046ed4a726d0
                                                                        • Instruction Fuzzy Hash: B911BB75904280DFCB16CF10C9C4B55BBB1FB85324F28C6AAD8494B656C33AD88ACBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.500925349.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_c7d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2abc48753aaa18e8b01c8b4327ba985d15b565b0f1f8f09131f8bc341b6c49fb
                                                                        • Instruction ID: cd480234d4f02377b09dd0ae4283f45836a442940f4c92b2986999913d03dc96
                                                                        • Opcode Fuzzy Hash: 2abc48753aaa18e8b01c8b4327ba985d15b565b0f1f8f09131f8bc341b6c49fb
                                                                        • Instruction Fuzzy Hash: 7C0147310083449BE7244A66CC84BA7BBACEF41778F18C55AE91E0A24AD3389844C6B1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.500925349.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_c7d000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fca7b39fbe6c5840e192eed8c1077502e47bc8757eb02061cb5ee50f177969e9
                                                                        • Instruction ID: 977068b0e0650d210a8f92971cea982ea3e5ff600e59dc3bcc16d949f99cccab
                                                                        • Opcode Fuzzy Hash: fca7b39fbe6c5840e192eed8c1077502e47bc8757eb02061cb5ee50f177969e9
                                                                        • Instruction Fuzzy Hash: FDF062714043449FEB248E15CC88B62FFA8EF81774F18C45AED195B286D379AD44CAB1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e0280d7619616bf31c6fddd2e2c69bfe7d3a35009bf8311c68be04648f5ab15b
                                                                        • Instruction ID: a4410461361df4a8a91eaf8b5338bc8d190b3e214f188a23bb5afd053a3cabfe
                                                                        • Opcode Fuzzy Hash: e0280d7619616bf31c6fddd2e2c69bfe7d3a35009bf8311c68be04648f5ab15b
                                                                        • Instruction Fuzzy Hash: 8F12B3F1C99B468BD390CF65E8981893FA1B745328FD1CA08D7612BAD0D7B4117ACF88
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d6d1b9bcb77a0000c0e0d6f99395ad4c2f49cfab7f3aa6aef733512f501de9e
                                                                        • Instruction ID: 54b30c0f252b1546d6b1365022dc3ba3bf1f8e9d35056e397bacafac142146f5
                                                                        • Opcode Fuzzy Hash: 2d6d1b9bcb77a0000c0e0d6f99395ad4c2f49cfab7f3aa6aef733512f501de9e
                                                                        • Instruction Fuzzy Hash: 19A15F32E0061ACFCF16DFA5C8446DEBBB2FF85304B15856AE905BB221EB71A915CF40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.501777895.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_27b0000_g9WPdiOMmP.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bc31bcede08994a87e7695540879a9914856ebb1a5c6f19799e05a3037157ddb
                                                                        • Instruction ID: 693a206ac7fe5b11866a0cd7fbb046b423065a745efb459b66d2efddf11e51e4
                                                                        • Opcode Fuzzy Hash: bc31bcede08994a87e7695540879a9914856ebb1a5c6f19799e05a3037157ddb
                                                                        • Instruction Fuzzy Hash: FBC11AB1C997468BD794CF65E8881897FA1BB85328F91CB08D3612B6D4D7B4107ACF88
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Execution Graph

                                                                        Execution Coverage:13.5%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:85
                                                                        Total number of Limit Nodes:7
                                                                        execution_graph 19252 e692f0 19253 e692ff 19252->19253 19255 e693e8 19252->19255 19256 e693fb 19255->19256 19257 e69413 19256->19257 19263 e69660 19256->19263 19267 e69670 19256->19267 19257->19253 19258 e6940b 19258->19257 19259 e69610 GetModuleHandleW 19258->19259 19260 e6963d 19259->19260 19260->19253 19264 e69684 19263->19264 19265 e696a9 19264->19265 19271 e68768 19264->19271 19265->19258 19268 e69684 19267->19268 19269 e68768 LoadLibraryExW 19268->19269 19270 e696a9 19268->19270 19269->19270 19270->19258 19272 e69850 LoadLibraryExW 19271->19272 19274 e698c9 19272->19274 19274->19265 19279 e6fe40 SetWindowLongW 19280 e6feac 19279->19280 19285 e6b6d0 GetCurrentProcess 19286 e6b743 19285->19286 19287 e6b74a GetCurrentThread 19285->19287 19286->19287 19288 e6b787 GetCurrentProcess 19287->19288 19289 e6b780 19287->19289 19290 e6b7bd 19288->19290 19289->19288 19291 e6b7e5 GetCurrentThreadId 19290->19291 19292 e6b816 19291->19292 19281 e6bdc1 19282 e6bd87 DuplicateHandle 19281->19282 19284 e6bdcf 19281->19284 19283 e6bd96 19282->19283 19275 e6fbf8 19276 e6fc60 CreateWindowExW 19275->19276 19278 e6fd1c 19276->19278 19293 e66758 19295 e66766 19293->19295 19296 e66344 19293->19296 19297 e6634f 19296->19297 19300 e66394 19297->19300 19299 e6688d 19299->19295 19301 e6639f 19300->19301 19304 e663c4 19301->19304 19303 e66962 19303->19299 19305 e663cf 19304->19305 19308 e663f4 19305->19308 19307 e66a62 19307->19303 19309 e663ff 19308->19309 19310 e671bc 19309->19310 19312 e6b406 19309->19312 19310->19307 19313 e6b429 19312->19313 19314 e6b44d 19313->19314 19317 e6b5b8 19313->19317 19321 e6b5a9 19313->19321 19314->19310 19318 e6b5c5 19317->19318 19320 e6b5ff 19318->19320 19325 e6a0ec 19318->19325 19320->19314 19323 e6b5c5 19321->19323 19322 e6b5ff 19322->19314 19323->19322 19324 e6a0ec 5 API calls 19323->19324 19324->19322 19326 e6a0f7 19325->19326 19327 e6c2f8 19326->19327 19329 e6b904 19326->19329 19330 e6b90f 19329->19330 19331 e6c367 19330->19331 19332 e663f4 5 API calls 19330->19332 19339 e6c3e0 19331->19339 19345 e6c3d1 19331->19345 19332->19331 19333 e6c375 19337 e6e0f0 LoadLibraryExW GetModuleHandleW 19333->19337 19338 e6e0d8 LoadLibraryExW GetModuleHandleW 19333->19338 19334 e6c3a0 19334->19327 19337->19334 19338->19334 19340 e6c40e 19339->19340 19342 e6c437 19340->19342 19344 e6c4df 19340->19344 19351 e6b9a0 19340->19351 19343 e6c4da KiUserCallbackDispatcher 19342->19343 19342->19344 19343->19344 19346 e6c40e 19345->19346 19347 e6b9a0 GetFocus 19346->19347 19348 e6c437 19346->19348 19350 e6c4df 19346->19350 19347->19348 19349 e6c4da KiUserCallbackDispatcher 19348->19349 19348->19350 19349->19350 19352 e6b9ab 19351->19352 19353 e6ba14 GetFocus 19352->19353 19354 e6c9f5 19352->19354 19353->19354 19354->19342

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 00E6B730
                                                                        • GetCurrentThread.KERNEL32 ref: 00E6B76D
                                                                        • GetCurrentProcess.KERNEL32 ref: 00E6B7AA
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00E6B803
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID: H
                                                                        • API String ID: 2063062207-1105002124
                                                                        • Opcode ID: 247b5091c51bad1634bf69d5913c3474ed1836271d52a9b14a20ee63ca5c26f4
                                                                        • Instruction ID: 203105b64e7c92f18693198983ac568b8297ea6c8235e85cb6d340d9dfbbdc60
                                                                        • Opcode Fuzzy Hash: 247b5091c51bad1634bf69d5913c3474ed1836271d52a9b14a20ee63ca5c26f4
                                                                        • Instruction Fuzzy Hash: 8D5165B4900648CFDB10CFA9D6487EEBBF1BF88304F24896AE019B7251C7746885CF66
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 00E6B730
                                                                        • GetCurrentThread.KERNEL32 ref: 00E6B76D
                                                                        • GetCurrentProcess.KERNEL32 ref: 00E6B7AA
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00E6B803
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID: H
                                                                        • API String ID: 2063062207-1105002124
                                                                        • Opcode ID: df8aaccdafea616c69dd0deef7a95620c6dfdecb6cb84f51615e54475e2e06ad
                                                                        • Instruction ID: 309da86a65ef491a699277587830b207741fb317ed3310b2de73b8cf5536031d
                                                                        • Opcode Fuzzy Hash: df8aaccdafea616c69dd0deef7a95620c6dfdecb6cb84f51615e54475e2e06ad
                                                                        • Instruction Fuzzy Hash: A15144B4900648CFDB14CFAAD548BEEBBF5BF88314F24896AE019B7250C7746884CB65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 837 e693e8-e693fd call e68704 840 e69413-e69417 837->840 841 e693ff 837->841 842 e6942b-e6946c 840->842 843 e69419-e69423 840->843 892 e69405 call e69660 841->892 893 e69405 call e69670 841->893 848 e6946e-e69476 842->848 849 e69479-e69487 842->849 843->842 844 e6940b-e6940d 844->840 847 e69548-e69608 844->847 885 e69610-e6963b GetModuleHandleW 847->885 886 e6960a-e6960d 847->886 848->849 851 e694ab-e694ad 849->851 852 e69489-e6948e 849->852 855 e694b0-e694b7 851->855 853 e69490-e69497 call e68710 852->853 854 e69499 852->854 860 e6949b-e694a9 853->860 854->860 856 e694c4-e694cb 855->856 857 e694b9-e694c1 855->857 861 e694cd-e694d5 856->861 862 e694d8-e694e1 call e68720 856->862 857->856 860->855 861->862 867 e694e3-e694eb 862->867 868 e694ee-e694f3 862->868 867->868 870 e694f5-e694fc 868->870 871 e69511-e69515 868->871 870->871 872 e694fe-e6950e call e68730 call e68740 870->872 890 e69518 call e69966 871->890 891 e69518 call e69968 871->891 872->871 874 e6951b-e6951e 876 e69520-e6953e 874->876 877 e69541-e69547 874->877 876->877 887 e69644-e69658 885->887 888 e6963d-e69643 885->888 886->885 888->887 890->874 891->874 892->844 893->844
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00E6962E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: fd364f6f19934bbca06aeb27f7385df56cf75ed52e0a06fbf070b98b1b9ac3c2
                                                                        • Instruction ID: 6af4e38777dae97b125f2873f45c24c066e70a69b60e31c60ace6c8142e8a984
                                                                        • Opcode Fuzzy Hash: fd364f6f19934bbca06aeb27f7385df56cf75ed52e0a06fbf070b98b1b9ac3c2
                                                                        • Instruction Fuzzy Hash: 0B714670A00B058FD764CF69D18579AB7F5FF88358F108A2EE49AD7A41DB34E806CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 894 e6fbec-e6fc5e 895 e6fc60-e6fc66 894->895 896 e6fc69-e6fc70 894->896 895->896 897 e6fc72-e6fc78 896->897 898 e6fc7b-e6fcb3 896->898 897->898 899 e6fcbb-e6fd1a CreateWindowExW 898->899 900 e6fd23-e6fd5b 899->900 901 e6fd1c-e6fd22 899->901 905 e6fd5d-e6fd60 900->905 906 e6fd68 900->906 901->900 905->906 907 e6fd69 906->907 907->907
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E6FD0A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 6193f4462c89e91738a09178bd19d5818bcc68d401dde344e11d5516bd764012
                                                                        • Instruction ID: 827e26fece794ba28162cab4a04cb3dabfedad910a2aacd6bf10ab92e7f79d34
                                                                        • Opcode Fuzzy Hash: 6193f4462c89e91738a09178bd19d5818bcc68d401dde344e11d5516bd764012
                                                                        • Instruction Fuzzy Hash: 5D51BEB1D003099FDB14CFA9D984ADEFBB5BF48354F24862AE819AB210D774A945CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 908 e6fbf8-e6fc5e 909 e6fc60-e6fc66 908->909 910 e6fc69-e6fc70 908->910 909->910 911 e6fc72-e6fc78 910->911 912 e6fc7b-e6fd1a CreateWindowExW 910->912 911->912 914 e6fd23-e6fd5b 912->914 915 e6fd1c-e6fd22 912->915 919 e6fd5d-e6fd60 914->919 920 e6fd68 914->920 915->914 919->920 921 e6fd69 920->921 921->921
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E6FD0A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 1f11d4b4e215a226b4b85e95776e0d244eb9be295aac1daf16d1bbfd54c43f31
                                                                        • Instruction ID: 6a103402359d9f436b306a8e27cb23138278c0c177db69080ddd754be87c8fbf
                                                                        • Opcode Fuzzy Hash: 1f11d4b4e215a226b4b85e95776e0d244eb9be295aac1daf16d1bbfd54c43f31
                                                                        • Instruction Fuzzy Hash: 9D419EB1D003099FDB14CF9AD884ADEFBB5BF48354F24852AE819AB210D775A945CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E6BD87
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 6c03d39c874510042ed52610bfc6cbec8463045abaa5e3c1716b56482fcc9557
                                                                        • Instruction ID: 46d3be98563db22783eba10a3fe80b7e6e2fa2e73887582e36bed36f55fbc811
                                                                        • Opcode Fuzzy Hash: 6c03d39c874510042ed52610bfc6cbec8463045abaa5e3c1716b56482fcc9557
                                                                        • Instruction Fuzzy Hash: 37316778A40F40DFE701DF71EA5A7A93BB6E78B305F10462AE9459B7D6CB780906CB01
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E6BD87
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 178d23ed90cc65d44f755f7f4bdf66ee32f2d3372f99e943073132f1aa6dfb45
                                                                        • Instruction ID: c91f4fc739452dbe38c11f96c8f80427cc837751c5bcb8d7e10fe11ee5c1f2e6
                                                                        • Opcode Fuzzy Hash: 178d23ed90cc65d44f755f7f4bdf66ee32f2d3372f99e943073132f1aa6dfb45
                                                                        • Instruction Fuzzy Hash: DC21E0B6900208DFDB10CFA9D584AEEFBF5FB48324F14841AE918A7310D378A955CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E6BD87
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: e20b876c5780f3e28e236403811a486a7a6504299b1f50628a0857edda3eb95d
                                                                        • Instruction ID: 9e2448bbaf2745702449cf9af446204195a1b8a304d07d119ad3f7fdad3e4098
                                                                        • Opcode Fuzzy Hash: e20b876c5780f3e28e236403811a486a7a6504299b1f50628a0857edda3eb95d
                                                                        • Instruction Fuzzy Hash: D621B3B59002089FDB10CF9AD584ADEFBF9EB48324F14841AE958A7210D378A954CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E696A9,00000800,00000000,00000000), ref: 00E698BA
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 4638d4c6df9ba76996b343c15dc674f9ddff843dfc65129a644c5fb973330764
                                                                        • Instruction ID: 681a990df2bc72f73cf223fcaa32d2e70f653bf21ce721ea7f868d3aeff44550
                                                                        • Opcode Fuzzy Hash: 4638d4c6df9ba76996b343c15dc674f9ddff843dfc65129a644c5fb973330764
                                                                        • Instruction Fuzzy Hash: B71133B68002098FCB14CF9AD444ADEFBF8EB49324F14842AE419B7601C374A949CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E696A9,00000800,00000000,00000000), ref: 00E698BA
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 3c4cb25a3d383be9ba0c80c7b34a41c2937b46fedfaf2fee2274f875d81800f6
                                                                        • Instruction ID: 72d38c14f858cbf5775841a7102aa1d16b1f0f72327869b6cd498d7db82c358a
                                                                        • Opcode Fuzzy Hash: 3c4cb25a3d383be9ba0c80c7b34a41c2937b46fedfaf2fee2274f875d81800f6
                                                                        • Instruction Fuzzy Hash: 721114B6C002098FDB10DF9AD444BDEFBF4EB48314F14842AD419B7600C378A545CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00E6962E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 21e0fff8f53bbd8dd31e53b7a70f26987ae1924b3715f5ede92b552909436908
                                                                        • Instruction ID: 2f5493f4b29c39b2418b93eb1f407e107726ff836c90511a3d8fc9d46d4d4daa
                                                                        • Opcode Fuzzy Hash: 21e0fff8f53bbd8dd31e53b7a70f26987ae1924b3715f5ede92b552909436908
                                                                        • Instruction Fuzzy Hash: 0411DFB5C007498FDB20CF9AD444ADEFBF8AB88324F14852AD429B7600D378A546CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?), ref: 00E6FE9D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: 9a610e5103e14814fa081b398217c017dd2a4c9e2df4da28578d20a0aee65326
                                                                        • Instruction ID: c59746fda14f53e7e6b79906936a6031a85f98958b0d9f823273637fd5e954d1
                                                                        • Opcode Fuzzy Hash: 9a610e5103e14814fa081b398217c017dd2a4c9e2df4da28578d20a0aee65326
                                                                        • Instruction Fuzzy Hash: CD11E0B5800209CFDB20CF99D585BEAFBF8FB48324F24845AD859B7601C378A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • SetWindowLongW.USER32(?,?,?), ref: 00E6FE9D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.700493150.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_e60000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID:
                                                                        • API String ID: 1378638983-0
                                                                        • Opcode ID: cfe2a121766005d5091dade3ef6e56ea2f207e2932d76174cafa5bec922f9434
                                                                        • Instruction ID: 3277c0d0d1005df59bb6e53f1866596d7f8694754ead59d225b16a3c095b2f24
                                                                        • Opcode Fuzzy Hash: cfe2a121766005d5091dade3ef6e56ea2f207e2932d76174cafa5bec922f9434
                                                                        • Instruction Fuzzy Hash: C91103B58002088FDB10CF9AD585BDEFBF8EB48324F10841AD819B7600C374A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.699845800.0000000000DAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DAD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_dad000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 55ae4571199ce8ba1a38b3c3274304445ec358d015a27bd9730d2ee73cdc903f
                                                                        • Instruction ID: 5d360224f9161818b10e7e9284f1e64861d1b801462d32f7f4b69ee893f9a0f6
                                                                        • Opcode Fuzzy Hash: 55ae4571199ce8ba1a38b3c3274304445ec358d015a27bd9730d2ee73cdc903f
                                                                        • Instruction Fuzzy Hash: 55213AB1904240DFDF15DF54D8C0B66BFA7FB8A328F248969D8060B656C33AD855C7B2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.699867422.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_dbd000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 43bb1eac2e2150f6278920c76ae2659d9f3a70b664543facc124f54355f6ecec
                                                                        • Instruction ID: f0b5af4780131497953ee66cd19dd5cb9b0b8bdee39fe52117eb1ef2e7cc1f85
                                                                        • Opcode Fuzzy Hash: 43bb1eac2e2150f6278920c76ae2659d9f3a70b664543facc124f54355f6ecec
                                                                        • Instruction Fuzzy Hash: 53214975504240DFCB14EF10D8C4B66BBA6FB84314F24C969D84A0B346D33AD807CB71
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.699867422.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_dbd000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dc13e5daf0d8b1c9a98fafd3c8f19988f8aead938f3f9649754591e1e6247553
                                                                        • Instruction ID: 23cbd07058fb01e7d70dbb91d99b2d85296c3aafd6737ba6577fc274ae64ab26
                                                                        • Opcode Fuzzy Hash: dc13e5daf0d8b1c9a98fafd3c8f19988f8aead938f3f9649754591e1e6247553
                                                                        • Instruction Fuzzy Hash: 932180755093C0CFCB12DF20D994B55BF71EB46314F28C5EAD8498B697C33A980ACB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 0000000F.00000002.699845800.0000000000DAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DAD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_15_2_dad000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6ad262f7e262abacbff50db4dee8e87071a2daebf469680c606094787e0e2c0d
                                                                        • Instruction ID: 48fac064aa7032bf057250ebc16e854d160bbb0851565461b9f929a3d7e450c4
                                                                        • Opcode Fuzzy Hash: 6ad262f7e262abacbff50db4dee8e87071a2daebf469680c606094787e0e2c0d
                                                                        • Instruction Fuzzy Hash: E511E976804280CFCF12CF14D5C4B56BF72FB85324F28C5A9D8050B656C336D856CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Execution Graph

                                                                        Execution Coverage:13.2%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:20
                                                                        Total number of Limit Nodes:0
                                                                        execution_graph 1308 3130480 1309 31304c3 1308->1309 1311 3130750 1308->1311 1313 3130755 1311->1313 1312 3130946 1313->1312 1316 31319d0 1313->1316 1320 31319bf 1313->1320 1317 31319e1 1316->1317 1324 3130744 1317->1324 1321 31319e1 1320->1321 1322 3130744 SearchPathW 1321->1322 1323 3131a1f 1322->1323 1323->1312 1326 3131a48 SearchPathW 1324->1326 1327 3131bfd 1326->1327 1328 31304a8 1329 31304c3 1328->1329 1330 3130750 SearchPathW 1328->1330 1330->1329 1331 3130728 1333 313072d SearchPathW 1331->1333 1334 3131bfd 1333->1334

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 3130728-3131ac1 6 3131ac3-3131ac9 0->6 7 3131acc-3131ad3 0->7 6->7 8 3131ad5-3131adb 7->8 9 3131ade-3131ae7 7->9 8->9 10 3131ae9-3131af5 9->10 11 3131af8-3131b01 9->11 10->11 12 3131b03-3131b30 11->12 13 3131b6e-3131b72 11->13 19 3131b32-3131b34 12->19 20 3131b60 12->20 14 3131b74-3131b97 13->14 15 3131b9d-3131ba8 13->15 14->15 17 3131bb4-3131bfb SearchPathW 15->17 18 3131baa-3131bb2 15->18 21 3131c04-3131c19 17->21 22 3131bfd-3131c03 17->22 18->17 24 3131b56-3131b5e 19->24 25 3131b36-3131b40 19->25 26 3131b65-3131b68 20->26 33 3131c1b-3131c27 21->33 34 3131c2f-3131c56 21->34 22->21 24->26 27 3131b42 25->27 28 3131b44-3131b52 25->28 26->13 27->28 28->28 32 3131b54 28->32 32->24 33->34 37 3131c66 34->37 38 3131c58-3131c5c 34->38 40 3131c67 37->40 38->37 39 3131c5e 38->39 39->37 40->40
                                                                        APIs
                                                                        • SearchPathW.KERNELBASE(?,?,?,?,00000000,00000000), ref: 03131BEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000014.00000002.523946189.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_20_2_3130000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: PathSearch
                                                                        • String ID:
                                                                        • API String ID: 2203818243-0
                                                                        • Opcode ID: 936741e488ab097de015256ea813220c9594e2989fbd75035f88970609e7daa5
                                                                        • Instruction ID: 114bf5b1e3e6e869bbe59424b8515dbc8b29b62dec799940dc7eed139083695f
                                                                        • Opcode Fuzzy Hash: 936741e488ab097de015256ea813220c9594e2989fbd75035f88970609e7daa5
                                                                        • Instruction Fuzzy Hash: 41714671D002199FCB24DFA9C8946DEFBF1BF49314F29852AE819AB250DB34A945CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 41 3131a3c-3131ac1 43 3131ac3-3131ac9 41->43 44 3131acc-3131ad3 41->44 43->44 45 3131ad5-3131adb 44->45 46 3131ade-3131ae7 44->46 45->46 47 3131ae9-3131af5 46->47 48 3131af8-3131b01 46->48 47->48 49 3131b03-3131b30 48->49 50 3131b6e-3131b72 48->50 56 3131b32-3131b34 49->56 57 3131b60 49->57 51 3131b74-3131b97 50->51 52 3131b9d-3131ba8 50->52 51->52 54 3131bb4-3131bfb SearchPathW 52->54 55 3131baa-3131bb2 52->55 58 3131c04-3131c19 54->58 59 3131bfd-3131c03 54->59 55->54 61 3131b56-3131b5e 56->61 62 3131b36-3131b40 56->62 63 3131b65-3131b68 57->63 70 3131c1b-3131c27 58->70 71 3131c2f-3131c56 58->71 59->58 61->63 64 3131b42 62->64 65 3131b44-3131b52 62->65 63->50 64->65 65->65 69 3131b54 65->69 69->61 70->71 74 3131c66 71->74 75 3131c58-3131c5c 71->75 77 3131c67 74->77 75->74 76 3131c5e 75->76 76->74 77->77
                                                                        APIs
                                                                        • SearchPathW.KERNELBASE(?,?,?,?,00000000,00000000), ref: 03131BEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000014.00000002.523946189.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_20_2_3130000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: PathSearch
                                                                        • String ID:
                                                                        • API String ID: 2203818243-0
                                                                        • Opcode ID: d5232dd09cf2b02261e2dd6a788f27bce146749f618c5f55a40171876f8f9620
                                                                        • Instruction ID: a735ad9b6e1959e6ca18937b8e7a66daed15ab7ff5ab039b28f35ae3750a4b8b
                                                                        • Opcode Fuzzy Hash: d5232dd09cf2b02261e2dd6a788f27bce146749f618c5f55a40171876f8f9620
                                                                        • Instruction Fuzzy Hash: 88711271D002199FDB24DF99C984A9EFBB1FF49314F298129E819AB250DB34A945CF80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 78 3130744-3131ac1 81 3131ac3-3131ac9 78->81 82 3131acc-3131ad3 78->82 81->82 83 3131ad5-3131adb 82->83 84 3131ade-3131ae7 82->84 83->84 85 3131ae9-3131af5 84->85 86 3131af8-3131b01 84->86 85->86 87 3131b03-3131b30 86->87 88 3131b6e-3131b72 86->88 94 3131b32-3131b34 87->94 95 3131b60 87->95 89 3131b74-3131b97 88->89 90 3131b9d-3131ba8 88->90 89->90 92 3131bb4-3131bfb SearchPathW 90->92 93 3131baa-3131bb2 90->93 96 3131c04-3131c19 92->96 97 3131bfd-3131c03 92->97 93->92 99 3131b56-3131b5e 94->99 100 3131b36-3131b40 94->100 101 3131b65-3131b68 95->101 108 3131c1b-3131c27 96->108 109 3131c2f-3131c56 96->109 97->96 99->101 102 3131b42 100->102 103 3131b44-3131b52 100->103 101->88 102->103 103->103 107 3131b54 103->107 107->99 108->109 112 3131c66 109->112 113 3131c58-3131c5c 109->113 115 3131c67 112->115 113->112 114 3131c5e 113->114 114->112 115->115
                                                                        APIs
                                                                        • SearchPathW.KERNELBASE(?,?,?,?,00000000,00000000), ref: 03131BEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000014.00000002.523946189.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_20_2_3130000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: PathSearch
                                                                        • String ID:
                                                                        • API String ID: 2203818243-0
                                                                        • Opcode ID: 0cefbe75400df0e329a563a543a2a0e4cad0b14cfe1b527bbcb4b83407a918bc
                                                                        • Instruction ID: 1e4fe246e2aae05ce8cd652ea3f52c68793d3b5c11f260f2ab0a9878c3fdf174
                                                                        • Opcode Fuzzy Hash: 0cefbe75400df0e329a563a543a2a0e4cad0b14cfe1b527bbcb4b83407a918bc
                                                                        • Instruction Fuzzy Hash: 2A7112B1D002189FDB24DF99C984A9EFBF1BF49314F298529E819AB350DB34A945CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Execution Graph

                                                                        Execution Coverage:13.4%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:26
                                                                        Total number of Limit Nodes:0
                                                                        execution_graph 1402 f804a8 1403 f804c3 1402->1403 1406 f808f0 1402->1406 1411 f80750 1402->1411 1410 f80916 1406->1410 1407 f80946 1410->1407 1416 f819bf 1410->1416 1420 f819d0 1410->1420 1413 f80755 1411->1413 1412 f80946 1413->1412 1414 f819bf SearchPathW 1413->1414 1415 f819d0 SearchPathW 1413->1415 1414->1412 1415->1412 1417 f819e1 1416->1417 1424 f80744 1417->1424 1421 f819e1 1420->1421 1422 f80744 SearchPathW 1421->1422 1423 f81a1f 1422->1423 1423->1407 1426 f81a48 SearchPathW 1424->1426 1427 f81bfd 1426->1427 1436 f80728 1438 f8072d SearchPathW 1436->1438 1439 f81bfd 1438->1439 1428 f80480 1429 f804c3 1428->1429 1430 f808f0 SearchPathW 1428->1430 1431 f80750 SearchPathW 1428->1431 1430->1429 1431->1429

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 f80728-f81ac1 6 f81acc-f81ad3 0->6 7 f81ac3-f81ac9 0->7 8 f81ade-f81ae7 6->8 9 f81ad5-f81adb 6->9 7->6 10 f81af8-f81b01 8->10 11 f81ae9-f81af5 8->11 9->8 12 f81b6e-f81b72 10->12 13 f81b03-f81b30 10->13 11->10 14 f81b9d-f81ba8 12->14 15 f81b74-f81b97 12->15 22 f81b60 13->22 23 f81b32-f81b34 13->23 16 f81baa-f81bb2 14->16 17 f81bb4-f81bfb SearchPathW 14->17 15->14 16->17 20 f81bfd-f81c03 17->20 21 f81c04-f81c19 17->21 20->21 32 f81c1b-f81c27 21->32 33 f81c2f-f81c56 21->33 24 f81b65-f81b68 22->24 25 f81b56-f81b5e 23->25 26 f81b36-f81b40 23->26 24->12 25->24 29 f81b42 26->29 30 f81b44-f81b52 26->30 29->30 30->30 34 f81b54 30->34 32->33 37 f81c58-f81c5c 33->37 38 f81c66 33->38 34->25 37->38 39 f81c5e 37->39 40 f81c67 38->40 39->38 40->40
                                                                        APIs
                                                                        • SearchPathW.KERNELBASE(?,?,?,?,00000000,00000000), ref: 00F81BEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000017.00000002.527422293.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_23_2_f80000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID: PathSearch
                                                                        • String ID:
                                                                        • API String ID: 2203818243-0
                                                                        • Opcode ID: b8d6f4a8907b51651afc343e60a4a35b7c6efe552ef4394d682a4f9fcdae3011
                                                                        • Instruction ID: 48ccb45354ab630ba047bd8a1cf84e4c962fb00731a641ad2c55be58b67b08cd
                                                                        • Opcode Fuzzy Hash: b8d6f4a8907b51651afc343e60a4a35b7c6efe552ef4394d682a4f9fcdae3011
                                                                        • Instruction Fuzzy Hash: 00713771D002198FDB24DF99C884ADDBBF5FF48324F258229E819AB350D734A946CF85
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 41 f81a3c-f81ac1 43 f81acc-f81ad3 41->43 44 f81ac3-f81ac9 41->44 45 f81ade-f81ae7 43->45 46 f81ad5-f81adb 43->46 44->43 47 f81af8-f81b01 45->47 48 f81ae9-f81af5 45->48 46->45 49 f81b6e-f81b72 47->49 50 f81b03-f81b30 47->50 48->47 51 f81b9d-f81ba8 49->51 52 f81b74-f81b97 49->52 59 f81b60 50->59 60 f81b32-f81b34 50->60 53 f81baa-f81bb2 51->53 54 f81bb4-f81bfb SearchPathW 51->54 52->51 53->54 57 f81bfd-f81c03 54->57 58 f81c04-f81c19 54->58 57->58 69 f81c1b-f81c27 58->69 70 f81c2f-f81c56 58->70 61 f81b65-f81b68 59->61 62 f81b56-f81b5e 60->62 63 f81b36-f81b40 60->63 61->49 62->61 66 f81b42 63->66 67 f81b44-f81b52 63->67 66->67 67->67 71 f81b54 67->71 69->70 74 f81c58-f81c5c 70->74 75 f81c66 70->75 71->62 74->75 76 f81c5e 74->76 77 f81c67 75->77 76->75 77->77
                                                                        APIs
                                                                        • SearchPathW.KERNELBASE(?,?,?,?,00000000,00000000), ref: 00F81BEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000017.00000002.527422293.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_23_2_f80000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID: PathSearch
                                                                        • String ID:
                                                                        • API String ID: 2203818243-0
                                                                        • Opcode ID: 25716e389bc175f1d1736760e42b0f4d94eba3bab1d5ab074e1268789f333782
                                                                        • Instruction ID: 5a90e12e09a8907340b7395e524e37f380bbceb4fabc3faca08ed2ae3a06f7e5
                                                                        • Opcode Fuzzy Hash: 25716e389bc175f1d1736760e42b0f4d94eba3bab1d5ab074e1268789f333782
                                                                        • Instruction Fuzzy Hash: E47124B1D002198FDB24DF99C884ADEBBB5FF48324F258129E819AB350D734A946CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 78 f80744-f81ac1 81 f81acc-f81ad3 78->81 82 f81ac3-f81ac9 78->82 83 f81ade-f81ae7 81->83 84 f81ad5-f81adb 81->84 82->81 85 f81af8-f81b01 83->85 86 f81ae9-f81af5 83->86 84->83 87 f81b6e-f81b72 85->87 88 f81b03-f81b30 85->88 86->85 89 f81b9d-f81ba8 87->89 90 f81b74-f81b97 87->90 97 f81b60 88->97 98 f81b32-f81b34 88->98 91 f81baa-f81bb2 89->91 92 f81bb4-f81bfb SearchPathW 89->92 90->89 91->92 95 f81bfd-f81c03 92->95 96 f81c04-f81c19 92->96 95->96 107 f81c1b-f81c27 96->107 108 f81c2f-f81c56 96->108 99 f81b65-f81b68 97->99 100 f81b56-f81b5e 98->100 101 f81b36-f81b40 98->101 99->87 100->99 104 f81b42 101->104 105 f81b44-f81b52 101->105 104->105 105->105 109 f81b54 105->109 107->108 112 f81c58-f81c5c 108->112 113 f81c66 108->113 109->100 112->113 114 f81c5e 112->114 115 f81c67 113->115 114->113 115->115
                                                                        APIs
                                                                        • SearchPathW.KERNELBASE(?,?,?,?,00000000,00000000), ref: 00F81BEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000017.00000002.527422293.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_23_2_f80000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID: PathSearch
                                                                        • String ID:
                                                                        • API String ID: 2203818243-0
                                                                        • Opcode ID: 5a5287e4f42acaf4072e81ffb3b57211c964bc1e56af673cc0d0d22f521c6859
                                                                        • Instruction ID: f9c30dc9b3009603b8e1f9c4b525004f672aa05ae9b0ebb9f5e383c3cae50857
                                                                        • Opcode Fuzzy Hash: 5a5287e4f42acaf4072e81ffb3b57211c964bc1e56af673cc0d0d22f521c6859
                                                                        • Instruction Fuzzy Hash: B87113B1D002198FDB24DF99C984ADEBBB5BF48324F258129E819AB350D734A946CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $,2m
                                                                        • API String ID: 0-3778023781
                                                                        • Opcode ID: 58133a2c33fc180103071e564e722608dfea97d009189b90b1b2789c5214f2a9
                                                                        • Instruction ID: 984357128fb14e4a485bec915f03e684510a9475ae149c195349408d8fe3174c
                                                                        • Opcode Fuzzy Hash: 58133a2c33fc180103071e564e722608dfea97d009189b90b1b2789c5214f2a9
                                                                        • Instruction Fuzzy Hash: 1B324B34714605CFCB14EF75E8A07AA77A2FB88315B60892CD5028B399DB75EC42DFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 96c0ef4bbb9d420d2720337f6fa22735a9bc2461acd922ec7f68c05336c05f03
                                                                        • Instruction ID: 06d724187c712acabcdc7ef50ccad9656f969e4eac842002be009e39880d45e4
                                                                        • Opcode Fuzzy Hash: 96c0ef4bbb9d420d2720337f6fa22735a9bc2461acd922ec7f68c05336c05f03
                                                                        • Instruction Fuzzy Hash: 9B314A319003448FDB15DB70D8147EA7BB2EF44310F0585AAD442973A2CFB5AD85DF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 553fc95016232c67f6bdfcb338d17b78ffb47c04cdc569098da2984548d38f4f
                                                                        • Instruction ID: a5540032eaeb12da04eedebdb9131f457da0a3a9584420ac0090304c722006a5
                                                                        • Opcode Fuzzy Hash: 553fc95016232c67f6bdfcb338d17b78ffb47c04cdc569098da2984548d38f4f
                                                                        • Instruction Fuzzy Hash: 0971A035A003488FCB159BA1C4186DEB7A2EF88314F158929D502973A5DFB5EC85DFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41da4967588c394e4227ccc676d5d95b207dfa767d84c08294af325617fcb934
                                                                        • Instruction ID: fca05a718dd167cbbe4403394f7f12165307a2acd7c8f0143b9e576c8cbaf5fb
                                                                        • Opcode Fuzzy Hash: 41da4967588c394e4227ccc676d5d95b207dfa767d84c08294af325617fcb934
                                                                        • Instruction Fuzzy Hash: 7C3136757441148FCB19AB79C46896D77E2EF8971931608B9E502CF3B6DB32DC42CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 608b415f4af53f2c04f201397ba30fd2f6a5acd220d5a2e22cdcb7883805bb07
                                                                        • Instruction ID: 036038ef22d87e53e2c5a37ad50e6aeb64e0bbcd3dd852c8b302dbc47ff9abd9
                                                                        • Opcode Fuzzy Hash: 608b415f4af53f2c04f201397ba30fd2f6a5acd220d5a2e22cdcb7883805bb07
                                                                        • Instruction Fuzzy Hash: C421D3797505148FC758AB79C45896D73E2EF8971931208B9E606CB375DB32DC42CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 62ce975a9b3909b1a6941cc6ee6c7a49f04007b4bdb65cad35989a388aba35b3
                                                                        • Instruction ID: e081b21b3945651e45ec3702f0e1a847a18c6800e649511f8ac13a31fb4c8cc4
                                                                        • Opcode Fuzzy Hash: 62ce975a9b3909b1a6941cc6ee6c7a49f04007b4bdb65cad35989a388aba35b3
                                                                        • Instruction Fuzzy Hash: D611E175E102098FCF00EFB8D8459EEBBF2FF89310B11866AE50997225DB749802CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c472574d24e5696ee446113422882ff71d352c5149ef43d1c291a669a66ec56
                                                                        • Instruction ID: 0cd4112c1ecc7dd85db5dc37f3e8d7668a2dda07b77356ed9e87e907d2a354fe
                                                                        • Opcode Fuzzy Hash: 4c472574d24e5696ee446113422882ff71d352c5149ef43d1c291a669a66ec56
                                                                        • Instruction Fuzzy Hash: B9019E35E102099FCB00EFB9D8409AEFBF5FF893107118666E61497225EB74A901CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 15d015365b464b7d4e560deac753fbc80df8147d1827dc6b7fbb84659b88e0e4
                                                                        • Instruction ID: cdcf1b9b8cd4e4d10d289864489ff0c6bea8d07d8e31139ef564d63fc2d1a005
                                                                        • Opcode Fuzzy Hash: 15d015365b464b7d4e560deac753fbc80df8147d1827dc6b7fbb84659b88e0e4
                                                                        • Instruction Fuzzy Hash: D2F054B190E3C55FCB4297B859122DE7FF19D4B200B1945EBD9C9D7163D1240A2FCBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 96431383dfa3c451ca54dbe38b694356ec55a5528d8c0093199f3400d50e190f
                                                                        • Instruction ID: fb7ae189080becbea03b38a3e9464997d480493551d287c6a24a1c514c3d8590
                                                                        • Opcode Fuzzy Hash: 96431383dfa3c451ca54dbe38b694356ec55a5528d8c0093199f3400d50e190f
                                                                        • Instruction Fuzzy Hash: 82F01C75A403099FDB14DBA5C1597EE7BB0BB48318F250869D002E73A1CFB4AD80DF60
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f159d869e94da3784456172f905ba011c383214c6fb089c11e614cf1a451af55
                                                                        • Instruction ID: 87c5c3aa4e3729ab4342c450a581dc95360ffcac0d28409c568966755ba95da8
                                                                        • Opcode Fuzzy Hash: f159d869e94da3784456172f905ba011c383214c6fb089c11e614cf1a451af55
                                                                        • Instruction Fuzzy Hash: 88D02B317002149FC710EB74E808A8537B8EF04B11F104050E504CB391DF71DC00CBE0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000019.00000002.536876904.0000000000FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FB0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_25_2_fb0000_dhcpmon.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69769cab8fb941b0125d76edbe59ddf64bd566dde3f359827652143a57d3c9f1
                                                                        • Instruction ID: 3d5bd7c2dc5a5fb1dd8ca40d8b34483eecad4b0d0cf6930e75ce2c54f729d80d
                                                                        • Opcode Fuzzy Hash: 69769cab8fb941b0125d76edbe59ddf64bd566dde3f359827652143a57d3c9f1
                                                                        • Instruction Fuzzy Hash: 5AD067B1D00229EF8B40EFB999051DEBBF8EA09650B1045A6DA19E3211E6715A109BE1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%