Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.PackedNET.331.28355.4334

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.PackedNET.331.28355.4334 (renamed file extension from 4334 to exe)
Analysis ID:624197
MD5:1f04c12ab3a22f6806d30bacb7552f19
SHA1:9913975b167b01b96364cad477ca6dfab71da454
SHA256:de42477eb270c42a2eaf57e6efb465263fc02e72e6c8442fdbd27aa3bd8e76a5
Tags:exe
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Writes to foreign memory regions
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.PackedNET.331.28355.exe (PID: 5012 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe" MD5: 1F04C12AB3A22F6806D30BACB7552F19)
    • RegSvcs.exe (PID: 4736 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • dhcpmon.exe (PID: 6792 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "484915e0-ae38-4675-9bf6-0f4a5bd5", "Domain1": "youngnonte.hopto.org", "Domain2": "91.193.75.133", "Port": 2323, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 31 entries
      SourceRuleDescriptionAuthorStrings
      4.2.RegSvcs.exe.5e30000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      4.2.RegSvcs.exe.5e30000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      4.2.RegSvcs.exe.5e30000.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        4.2.RegSvcs.exe.5e30000.6.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xf778:$x2: NanoCore.ClientPlugin
        • 0xf7ad:$x3: NanoCore.ClientPluginHost
        • 0xf76c:$i2: IClientData
        • 0xf78e:$i3: IClientNetwork
        • 0xf79d:$i5: IClientDataHost
        • 0xf7c7:$i6: IClientLoggingHost
        • 0xf7da:$i7: IClientNetworkHost
        • 0xf7ed:$i8: IClientUIHost
        • 0xf7fb:$i9: IClientNameObjectCollection
        • 0xf817:$i10: IClientReadOnlyNameObjectCollection
        • 0xf56a:$s1: ClientPlugin
        • 0xf781:$s1: ClientPlugin
        • 0x147a2:$s6: get_ClientSettings
        4.2.RegSvcs.exe.3c58a48.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        Click to see the 78 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Timestamp:192.168.2.791.193.75.1334979723232816718 05/11/22-10:42:39.036019
        SID:2816718
        Source Port:49797
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334985723232816766 05/11/22-10:43:23.924010
        SID:2816766
        Source Port:49857
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334987523232816766 05/11/22-10:43:44.394960
        SID:2816766
        Source Port:49875
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334986923232816766 05/11/22-10:43:31.252983
        SID:2816766
        Source Port:49869
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334979723232816766 05/11/22-10:42:39.036019
        SID:2816766
        Source Port:49797
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334982123232816766 05/11/22-10:43:17.029709
        SID:2816766
        Source Port:49821
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334980323232816766 05/11/22-10:42:46.018391
        SID:2816766
        Source Port:49803
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334980923232816766 05/11/22-10:43:06.473922
        SID:2816766
        Source Port:49809
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334987323232816766 05/11/22-10:43:38.940134
        SID:2816766
        Source Port:49873
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334978723232816766 05/11/22-10:42:24.860231
        SID:2816766
        Source Port:49787
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334980723232816766 05/11/22-10:42:53.078454
        SID:2816766
        Source Port:49807
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334977723232816766 05/11/22-10:42:09.828204
        SID:2816766
        Source Port:49777
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334987323232816718 05/11/22-10:43:38.940134
        SID:2816718
        Source Port:49873
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334979423232816766 05/11/22-10:42:31.876458
        SID:2816766
        Source Port:49794
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:91.193.75.133192.168.2.72323498212810290 05/11/22-10:43:15.841800
        SID:2810290
        Source Port:2323
        Destination Port:49821
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334978223232816766 05/11/22-10:42:17.828455
        SID:2816766
        Source Port:49782
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.791.193.75.1334980823232816766 05/11/22-10:43:00.269339
        SID:2816766
        Source Port:49808
        Destination Port:2323
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "484915e0-ae38-4675-9bf6-0f4a5bd5", "Domain1": "youngnonte.hopto.org", "Domain2": "91.193.75.133", "Port": 2323, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeReversingLabs: Detection: 31%
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTR
        Source: 4.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.RegSvcs.exe.5e30000.6.unpackAvira: Label: TR/NanoCore.fadte
        Source: 4.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: (PVo,C:\Windows\System.pdb source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: symbols\dll\System.pdb*Z source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: RegSvcs.pdb, source: dhcpmon.exe, 00000008.00000002.443557316.0000000000F72000.00000002.00000001.01000000.00000009.sdmp, dhcpmon.exe.4.dr
        Source: Binary string: ?.pdb source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 00000008.00000002.443557316.0000000000F72000.00000002.00000001.01000000.00000009.sdmp, dhcpmon.exe.4.dr
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000003.425820771.00000000060BB000.00000004.00000800.00020000.00000000.sdmp

        Networking

        barindex
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49777 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49782 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49787 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49794 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49797 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49797 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49803 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49807 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49808 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49809 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 91.193.75.133:2323 -> 192.168.2.7:49821
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49821 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49857 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49869 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49873 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49873 -> 91.193.75.133:2323
        Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49875 -> 91.193.75.133:2323
        Source: Malware configuration extractorURLs: youngnonte.hopto.org
        Source: Malware configuration extractorURLs: 91.193.75.133
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: Joe Sandbox ViewIP Address: 91.193.75.133 91.193.75.133
        Source: global trafficTCP traffic: 192.168.2.7:49777 -> 91.193.75.133:2323
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: dhcpmon.exe, 00000008.00000002.444043931.0000000001642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c#
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: youngnonte.hopto.org
        Source: RegSvcs.exe, 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTR

        System Summary

        barindex
        Source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5d90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5d90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.2c29e44.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.2c29e44.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5d90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5d90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.5d90000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.2c29e44.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.2c29e44.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 4.2.RegSvcs.exe.2c29e44.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BDE480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BDE47B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02BDBBD4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06320040
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.420481115.00000000077F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.411953086.0000000000A7D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTypeLoadExceptionHol.exeD vs SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000003.401361767.0000000003E36000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeBinary or memory string: OriginalFilenameTypeLoadExceptionHol.exeD vs SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeReversingLabs: Detection: 31%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe:Zone.IdentifierJump to behavior
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.logJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/6@14/2
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000000.360395771.0000000000962000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT TOP 1 FirstDate FROM OrderData WHERE `Order`="{0}" ORDER BY FirstDate ASCmUPDATE OrderData SET PINCode="{1}" WHERE PINCode="{0}"ACREATE DATABASE `{0}`; USE `{0}`
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMutant created: \Sessions\1\BaseNamedObjects\JolrnQINyAZG
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{484915e0-ae38-4675-9bf6-0f4a5bd5837c}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5536:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeString found in binary or memory: user-add
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeString found in binary or memory: note-add
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeString found in binary or memory: <!--StartFragment -->
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeString found in binary or memory: user-add
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeString found in binary or memory: note-add
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeString found in binary or memory: <<<<<<<3+<!--StartFragment -->
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic file information: File size 1173504 > 1048576
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x108c00
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: (PVo,C:\Windows\System.pdb source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: symbols\dll\System.pdb*Z source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: RegSvcs.pdb, source: dhcpmon.exe, 00000008.00000002.443557316.0000000000F72000.00000002.00000001.01000000.00000009.sdmp, dhcpmon.exe.4.dr
        Source: Binary string: ?.pdb source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: RegSvcs.pdb source: dhcpmon.exe, dhcpmon.exe, 00000008.00000002.443557316.0000000000F72000.00000002.00000001.01000000.00000009.sdmp, dhcpmon.exe.4.dr
        Source: Binary string: System.pdb source: RegSvcs.exe, 00000004.00000002.632443926.0000000006BEC000.00000004.00000010.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000003.425820771.00000000060BB000.00000004.00000800.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 0.0.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.960000.0.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.960000.0.unpack, JobClock/frmJobClock.cs.Net Code: ????????????????????????????????????????? System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: initial sampleStatic PE information: section name: .text entropy: 7.16329250729
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 00000000.00000002.415299432.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTR
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.415299432.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.415299432.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe TID: 1188Thread sleep time: -45733s >= -30000s
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe TID: 6392Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6992Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5903
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3351
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 843
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeThread delayed: delay time: 45733
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: RegSvcs.exe, 00000004.00000002.631933252.0000000006090000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG[
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A18008
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 0.0.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.960000.0.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.960000.0.unpack, JobClock/KeyboardInfo.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32.dll')
        Source: 4.0.RegSvcs.exe.400000.2.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 4.0.RegSvcs.exe.400000.1.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 4.0.RegSvcs.exe.400000.4.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 4.0.RegSvcs.exe.400000.0.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 4.0.RegSvcs.exe.400000.3.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: RegSvcs.exe, 00000004.00000002.628233352.0000000002C6F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerh+
        Source: RegSvcs.exe, 00000004.00000002.629572921.000000000303B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.628399868.0000000002D0F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.629422526.0000000002FFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000004.00000002.628399868.0000000002D0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHaXkh
        Source: RegSvcs.exe, 00000004.00000002.628399868.0000000002D0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
        Source: RegSvcs.exe, 00000004.00000002.632409728.000000000696E000.00000004.00000010.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.632329047.00000000065AD000.00000004.00000010.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.631721041.0000000005D1B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerT
        Source: RegSvcs.exe, 00000004.00000002.628399868.0000000002D0F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.629422526.0000000002FFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`r
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: RegSvcs.exe, 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e30000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3fc3b00.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c5d071.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5e34629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3c58a48.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f910e0.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.PackedNET.331.28355.exe.3f52ac0.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe PID: 5012, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4736, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Command and Scripting Interpreter
        Path Interception212
        Process Injection
        2
        Masquerading
        11
        Input Capture
        11
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts1
        Native API
        Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)212
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets12
        System Information Discovery
        SSHKeyloggingData Transfer Size Limits11
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
        Obfuscated Files or Information
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.PackedNET.331.28355.exe32%ReversingLabsWin32.Trojan.Pwsx
        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
        SourceDetectionScannerLabelLinkDownload
        4.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.RegSvcs.exe.5e30000.6.unpack100%AviraTR/NanoCore.fadteDownload File
        4.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        youngnonte.hopto.org0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://go.microsoft.c#0%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        91.193.75.1330%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        youngnonte.hopto.org
        91.193.75.133
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          youngnonte.hopto.orgtrue
          • Avira URL Cloud: safe
          unknown
          91.193.75.133true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8SecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://go.microsoft.c#dhcpmon.exe, 00000008.00000002.444043931.0000000001642000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.urwpp.deDPleaseSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comSecuriteInfo.com.Trojan.PackedNET.331.28355.exe, 00000000.00000002.419340426.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              91.193.75.133
                              youngnonte.hopto.orgSerbia
                              209623DAVID_CRAIGGGtrue
                              IP
                              192.168.2.1
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:624197
                              Start date and time: 11/05/202210:40:222022-05-11 10:40:22 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 33s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:SecuriteInfo.com.Trojan.PackedNET.331.28355.4334 (renamed file extension from 4334 to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:23
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@5/6@14/2
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HDC Information:
                              • Successful, ratio: 0.9% (good quality ratio 0.9%)
                              • Quality average: 100%
                              • Quality standard deviation: 0%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded domains from analysis (whitelisted): fp-afd.azureedge.us, client.wns.windows.com, fs.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, b-ring.msedge.net, arc.msn.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, login.live.com, fp-vp.azureedge.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                              • Execution Graph export aborted for target dhcpmon.exe, PID 6792 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              TimeTypeDescription
                              10:41:52API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.PackedNET.331.28355.exe modified
                              10:42:06API Interceptor805x Sleep call for process: RegSvcs.exe modified
                              10:42:07AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):45152
                              Entropy (8bit):6.149629800481177
                              Encrypted:false
                              SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                              MD5:2867A3817C9245F7CF518524DFD18F28
                              SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                              SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                              SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                              Malicious:false
                              Antivirus:
                              • Antivirus: Metadefender, Detection: 0%, Browse
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:high, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):142
                              Entropy (8bit):5.090621108356562
                              Encrypted:false
                              SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                              MD5:8C0458BB9EA02D50565175E38D577E35
                              SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                              SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                              SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):232
                              Entropy (8bit):7.024371743172393
                              Encrypted:false
                              SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                              MD5:32D0AAE13696FF7F8AF33B2D22451028
                              SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                              SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                              SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              File Type:Non-ISO extended-ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:Ftn:Ftn
                              MD5:9E0F3049136E4ABE28D27EE1B11D0884
                              SHA1:2A5E18BB091286E43CD954AF4D421D78CE042A7C
                              SHA-256:86880178E275C92A02FA7EC15A1626618DE00FCE75EA83600F79C39E2AAAAC37
                              SHA-512:7EA88728E379BF9F73DF01F18B0F8A8C70F5FACB7234D9DF1B1E498FE7B5B3021C998BEA2378A59B39D12396254A3C3B4BF77D7B772C3716667501753D1564CE
                              Malicious:true
                              Preview:.>..u3.H
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1141
                              Entropy (8bit):4.44831826838854
                              Encrypted:false
                              SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                              MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                              SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                              SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                              SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                              Malicious:false
                              Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.026942711928976
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
                              File size:1173504
                              MD5:1f04c12ab3a22f6806d30bacb7552f19
                              SHA1:9913975b167b01b96364cad477ca6dfab71da454
                              SHA256:de42477eb270c42a2eaf57e6efb465263fc02e72e6c8442fdbd27aa3bd8e76a5
                              SHA512:2b95be12e4df50eeb09b950e31ae7003ba1fe540475cd32cd5e4260e59fdbeab8e6378ed457d43ab1142b1bf40e23ec20c849065bb103b79b0179bfd1b8ac274
                              SSDEEP:12288:m+Cenfxt7J00Fq6j/wXgl4NV77zvRE2hEr5hHeC5ROGFmTDcvvj6yVBJGen0ni+f:mZg20Fbo7/762hM5hPTmTAL
                              TLSH:E24528987254F5DEC85BD071CE685CF0AA207C66C32B820B50173D9DB97EA83DF219B6
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Czb..............0......Z........... ........@.. .......................@............@................................
                              Icon Hash:f274fec6b6c2e00c
                              Entrypoint:0x50aace
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x627A439B [Tue May 10 10:51:07 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x10aa780x53.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x10c0000x15718.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1220000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x108ad40x108c00False0.649346745161data7.16329250729IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x10c0000x157180x15800False0.151662427326data4.00324413901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1220000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x10c1d80x8a8data
                              RT_ICON0x10ca800x568GLS_BINARY_LSB_FIRST
                              RT_ICON0x10cfe80x10828data
                              RT_ICON0x11d8100x25a8data
                              RT_ICON0x11fdb80x10a8data
                              RT_ICON0x120e600x468GLS_BINARY_LSB_FIRST
                              RT_GROUP_ICON0x1212c80x5adata
                              RT_VERSION0x1213240x3f4data
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2011 BASeCamp Software Solutions
                              Assembly Version1.4.8.0
                              InternalNameTypeLoadExceptionHol.exe
                              FileVersion1.4.8.0
                              CompanyNameBASeCamp Software Solutions
                              LegalTrademarks
                              Comments
                              ProductNameBASeCamp JobClock
                              ProductVersion1.4.8.0
                              FileDescriptionJobClock Administration Applet
                              OriginalFilenameTypeLoadExceptionHol.exe
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              192.168.2.791.193.75.1334979723232816718 05/11/22-10:42:39.036019TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497972323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334985723232816766 05/11/22-10:43:23.924010TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498572323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334987523232816766 05/11/22-10:43:44.394960TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498752323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334986923232816766 05/11/22-10:43:31.252983TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498692323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334979723232816766 05/11/22-10:42:39.036019TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497972323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334982123232816766 05/11/22-10:43:17.029709TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498212323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334980323232816766 05/11/22-10:42:46.018391TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498032323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334980923232816766 05/11/22-10:43:06.473922TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498092323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334987323232816766 05/11/22-10:43:38.940134TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498732323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334978723232816766 05/11/22-10:42:24.860231TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497872323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334980723232816766 05/11/22-10:42:53.078454TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498072323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334977723232816766 05/11/22-10:42:09.828204TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497772323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334987323232816718 05/11/22-10:43:38.940134TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon498732323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334979423232816766 05/11/22-10:42:31.876458TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497942323192.168.2.791.193.75.133
                              91.193.75.133192.168.2.72323498212810290 05/11/22-10:43:15.841800TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 123234982191.193.75.133192.168.2.7
                              192.168.2.791.193.75.1334978223232816766 05/11/22-10:42:17.828455TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497822323192.168.2.791.193.75.133
                              192.168.2.791.193.75.1334980823232816766 05/11/22-10:43:00.269339TCP2816766ETPRO TROJAN NanoCore RAT CnC 7498082323192.168.2.791.193.75.133
                              TimestampSource PortDest PortSource IPDest IP
                              May 11, 2022 10:42:07.884488106 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:08.101824045 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:08.101926088 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:08.289627075 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:08.561732054 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:08.702646971 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:08.717859983 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:08.949024916 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:08.951173067 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.218835115 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.366214037 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.628810883 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.630662918 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.632252932 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.634701014 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.636718035 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.636847019 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.640805006 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.643790960 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.643906116 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.647773027 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.651766062 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.651940107 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.659866095 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.667797089 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.668570042 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.828203917 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.868817091 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.869220018 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.878812075 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.878846884 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.878871918 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.879038095 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.879064083 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.879998922 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.880110979 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.881819963 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.882283926 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.884793043 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.884953022 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.886666059 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.887518883 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.889000893 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.891669989 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.891810894 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.892244101 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.896337986 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.896538973 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.900554895 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.901788950 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.902044058 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.907888889 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.907967091 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.909468889 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.910161972 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.917926073 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.917952061 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.918090105 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.924743891 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.924767017 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.924783945 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:09.924873114 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:09.925044060 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.107511044 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.111494064 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.111659050 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.112443924 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.112489939 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.113070965 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.117878914 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.119751930 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.120070934 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.127706051 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.127760887 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.127885103 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.127943039 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.137955904 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.137998104 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.138148069 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.144026041 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.144138098 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.148011923 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.148899078 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.149030924 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.152810097 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.152846098 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.152901888 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.160171032 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.163289070 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.163321018 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.163376093 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.164191008 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.164293051 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.165267944 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.167901039 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.168031931 CEST497772323192.168.2.791.193.75.133
                              May 11, 2022 10:42:10.177052975 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.177100897 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.177129030 CEST23234977791.193.75.133192.168.2.7
                              May 11, 2022 10:42:10.177254915 CEST497772323192.168.2.791.193.75.133
                              TimestampSource PortDest PortSource IPDest IP
                              May 11, 2022 10:42:07.846601009 CEST5051953192.168.2.78.8.8.8
                              May 11, 2022 10:42:07.867922068 CEST53505198.8.8.8192.168.2.7
                              May 11, 2022 10:42:15.350569963 CEST5414353192.168.2.78.8.8.8
                              May 11, 2022 10:42:15.369637966 CEST53541438.8.8.8192.168.2.7
                              May 11, 2022 10:42:22.935004950 CEST5248053192.168.2.78.8.8.8
                              May 11, 2022 10:42:22.954726934 CEST53524808.8.8.8192.168.2.7
                              May 11, 2022 10:42:29.905711889 CEST5012553192.168.2.78.8.8.8
                              May 11, 2022 10:42:29.927062035 CEST53501258.8.8.8192.168.2.7
                              May 11, 2022 10:42:37.024189949 CEST6521453192.168.2.78.8.8.8
                              May 11, 2022 10:42:37.043608904 CEST53652148.8.8.8192.168.2.7
                              May 11, 2022 10:42:44.090857029 CEST6284353192.168.2.78.8.8.8
                              May 11, 2022 10:42:44.109671116 CEST53628438.8.8.8192.168.2.7
                              May 11, 2022 10:42:51.063699961 CEST5994653192.168.2.78.8.8.8
                              May 11, 2022 10:42:51.082979918 CEST53599468.8.8.8192.168.2.7
                              May 11, 2022 10:42:58.456557035 CEST6092053192.168.2.78.8.8.8
                              May 11, 2022 10:42:58.477355957 CEST53609208.8.8.8192.168.2.7
                              May 11, 2022 10:43:05.366317034 CEST5116053192.168.2.78.8.8.8
                              May 11, 2022 10:43:05.385807991 CEST53511608.8.8.8192.168.2.7
                              May 11, 2022 10:43:15.109352112 CEST4949553192.168.2.78.8.8.8
                              May 11, 2022 10:43:15.128709078 CEST53494958.8.8.8192.168.2.7
                              May 11, 2022 10:43:21.949346066 CEST6283753192.168.2.78.8.8.8
                              May 11, 2022 10:43:21.971178055 CEST53628378.8.8.8192.168.2.7
                              May 11, 2022 10:43:28.166333914 CEST5151653192.168.2.78.8.8.8
                              May 11, 2022 10:43:28.185709953 CEST53515168.8.8.8192.168.2.7
                              May 11, 2022 10:43:36.466886044 CEST6452153192.168.2.78.8.8.8
                              May 11, 2022 10:43:36.487708092 CEST53645218.8.8.8192.168.2.7
                              May 11, 2022 10:43:43.429339886 CEST4919853192.168.2.78.8.8.8
                              May 11, 2022 10:43:43.447773933 CEST53491988.8.8.8192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              May 11, 2022 10:42:07.846601009 CEST192.168.2.78.8.8.80x3026Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:15.350569963 CEST192.168.2.78.8.8.80xef57Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:22.935004950 CEST192.168.2.78.8.8.80x7a53Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:29.905711889 CEST192.168.2.78.8.8.80x8cdfStandard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:37.024189949 CEST192.168.2.78.8.8.80x373bStandard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:44.090857029 CEST192.168.2.78.8.8.80x2b83Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:51.063699961 CEST192.168.2.78.8.8.80xa6c6Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:42:58.456557035 CEST192.168.2.78.8.8.80x6f9cStandard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:43:05.366317034 CEST192.168.2.78.8.8.80x7267Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:43:15.109352112 CEST192.168.2.78.8.8.80x881cStandard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:43:21.949346066 CEST192.168.2.78.8.8.80x1d62Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:43:28.166333914 CEST192.168.2.78.8.8.80xccd9Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:43:36.466886044 CEST192.168.2.78.8.8.80xc95dStandard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              May 11, 2022 10:43:43.429339886 CEST192.168.2.78.8.8.80x78f5Standard query (0)youngnonte.hopto.orgA (IP address)IN (0x0001)
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              May 11, 2022 10:42:07.867922068 CEST8.8.8.8192.168.2.70x3026No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:15.369637966 CEST8.8.8.8192.168.2.70xef57No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:22.954726934 CEST8.8.8.8192.168.2.70x7a53No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:29.927062035 CEST8.8.8.8192.168.2.70x8cdfNo error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:37.043608904 CEST8.8.8.8192.168.2.70x373bNo error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:44.109671116 CEST8.8.8.8192.168.2.70x2b83No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:51.082979918 CEST8.8.8.8192.168.2.70xa6c6No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:42:58.477355957 CEST8.8.8.8192.168.2.70x6f9cNo error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:43:05.385807991 CEST8.8.8.8192.168.2.70x7267No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:43:15.128709078 CEST8.8.8.8192.168.2.70x881cNo error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:43:21.971178055 CEST8.8.8.8192.168.2.70x1d62No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:43:28.185709953 CEST8.8.8.8192.168.2.70xccd9No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:43:36.487708092 CEST8.8.8.8192.168.2.70xc95dNo error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)
                              May 11, 2022 10:43:43.447773933 CEST8.8.8.8192.168.2.70x78f5No error (0)youngnonte.hopto.org91.193.75.133A (IP address)IN (0x0001)

                              Click to jump to process

                              Target ID:0
                              Start time:10:41:39
                              Start date:11/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.331.28355.exe"
                              Imagebase:0x960000
                              File size:1173504 bytes
                              MD5 hash:1F04C12AB3A22F6806D30BACB7552F19
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.415299432.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.414167821.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.416862550.0000000003F52000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              Target ID:4
                              Start time:10:42:01
                              Start date:11/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Imagebase:0x8d0000
                              File size:45152 bytes
                              MD5 hash:2867A3817C9245F7CF518524DFD18F28
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.408831258.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.409213843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.631819376.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.408232276.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.629684099.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.626920584.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.628123506.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.631747506.0000000005D90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.409721909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:high

                              Target ID:8
                              Start time:10:42:16
                              Start date:11/05/2022
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                              Imagebase:0x7ff7e8070000
                              File size:45152 bytes
                              MD5 hash:2867A3817C9245F7CF518524DFD18F28
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Antivirus matches:
                              • Detection: 0%, Metadefender, Browse
                              • Detection: 0%, ReversingLabs
                              Reputation:high

                              Target ID:9
                              Start time:10:42:17
                              Start date:11/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7bab80000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              No disassembly