Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gNrfORqjCV.exe

Overview

General Information

Sample Name:gNrfORqjCV.exe
Analysis ID:800437
MD5:60c8d91adfa30a60afa2f5437ce7d041
SHA1:f8460389f343481d7420073ad1da2f90ddedc696
SHA256:5707c702f70cc5bf864e10aaab48f9300e3be0a7892d8faa1810145f0af93d2d
Tags:exe
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • gNrfORqjCV.exe (PID: 5240 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
    • powershell.exe (PID: 492 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 1544 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5936 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • gNrfORqjCV.exe (PID: 5320 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
      • schtasks.exe (PID: 5256 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6016 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • GzGmImHFmOq.exe (PID: 5000 cmdline: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
    • schtasks.exe (PID: 5660 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • GzGmImHFmOq.exe (PID: 5544 cmdline: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • gNrfORqjCV.exe (PID: 5248 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe 0 MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
    • powershell.exe (PID: 1252 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 400 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5684 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • gNrfORqjCV.exe (PID: 1324 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • dhcpmon.exe (PID: 4544 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • dhcpmon.exe (PID: 4720 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "cb7cb109-a06b-4fd7-8d0e-5290e77d", "Group": "MOFASA", "Domain1": "nonoise.duckdns.org", "Domain2": "127.0.0.1", "Port": 6060, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "84.200.70.40", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0x1a3fe:$b5: GetBlockHash
    • 0x124fe:$b6: AddHostEntry
    • 0x161f1:$b7: LogClientException
    • 0x1246b:$b8: PipeExists
    • 0xffb7:$b9: IClientLoggingHost
    00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Click to see the 57 entries
      SourceRuleDescriptionAuthorStrings
      23.2.gNrfORqjCV.exe.398062c.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      23.2.gNrfORqjCV.exe.398062c.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      23.2.gNrfORqjCV.exe.398062c.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        23.2.gNrfORqjCV.exe.398062c.4.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xd978:$x2: NanoCore.ClientPlugin
        • 0xd9ad:$x3: NanoCore.ClientPluginHost
        • 0xd96c:$i2: IClientData
        • 0xd98e:$i3: IClientNetwork
        • 0xd99d:$i5: IClientDataHost
        • 0xd9c7:$i6: IClientLoggingHost
        • 0xd9da:$i7: IClientNetworkHost
        • 0xd9ed:$i8: IClientUIHost
        • 0xd9fb:$i9: IClientNameObjectCollection
        • 0xda17:$i10: IClientReadOnlyNameObjectCollection
        • 0xd76a:$s1: ClientPlugin
        • 0xd981:$s1: ClientPlugin
        • 0x129a2:$s6: get_ClientSettings
        23.2.gNrfORqjCV.exe.398062c.4.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
        • 0xd9ad:$a1: NanoCore.ClientPluginHost
        • 0xd978:$a2: NanoCore.ClientPlugin
        • 0x128f3:$b1: get_BuilderSettings
        • 0x12862:$b7: LogClientException
        • 0xd9c7:$b9: IClientLoggingHost
        Click to see the 137 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Persistence and Installation Behavior

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\gNrfORqjCV.exe, ParentImage: C:\Users\user\Desktop\gNrfORqjCV.exe, ParentProcessId: 5240, ParentProcessName: gNrfORqjCV.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp, ProcessId: 5936, ProcessName: schtasks.exe

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: gNrfORqjCV.exeReversingLabs: Detection: 64%
        Source: gNrfORqjCV.exeVirustotal: Detection: 58%Perma Link
        Source: nonoise.duckdns.orgAvira URL Cloud: Label: malware
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 64%
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeReversingLabs: Detection: 64%
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR
        Source: gNrfORqjCV.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJoe Sandbox ML: detected
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "cb7cb109-a06b-4fd7-8d0e-5290e77d", "Group": "MOFASA", "Domain1": "nonoise.duckdns.org", "Domain2": "127.0.0.1", "Port": 6060, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "84.200.70.40", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Source: gNrfORqjCV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: gNrfORqjCV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 4x nop then jmp 07E27B45h0_2_07E27007
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 4x nop then jmp 07E27B45h0_2_07E277A3
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 4x nop then jmp 078916F5h7_2_07890BB7
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 4x nop then jmp 078916F5h7_2_07891351

        Networking

        barindex
        Source: Malware configuration extractorURLs: nonoise.duckdns.org
        Source: Malware configuration extractorURLs: 127.0.0.1
        Source: unknownDNS query: name: nonoise.duckdns.org
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: Joe Sandbox ViewIP Address: 194.5.98.24 194.5.98.24
        Source: global trafficTCP traffic: 192.168.2.5:49701 -> 194.5.98.24:6060
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.70.40
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: gNrfORqjCV.exe, 00000000.00000003.296515775.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296396139.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
        Source: gNrfORqjCV.exe, 00000000.00000003.295899082.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296138391.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296240339.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295949444.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296360113.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296039310.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296275045.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295980858.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296109893.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296305097.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003046000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.T
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comC
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCH
        Source: gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCk
        Source: gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCp
        Source: gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comde
        Source: gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comego
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comlg
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.p
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coms0
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comsb
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057EB000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057F4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersR
        Source: gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersT
        Source: gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersb
        Source: gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerse
        Source: gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersl
        Source: gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersno
        Source: gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
        Source: gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFH
        Source: gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305277458.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305332327.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305058105.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305393745.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFu
        Source: gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalicS
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsFu
        Source: gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalso
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
        Source: gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
        Source: gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306618063.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306685172.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd$
        Source: gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdy
        Source: gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
        Source: gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessedQ
        Source: gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comf
        Source: gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comion
        Source: gNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comony
        Source: gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comuevo
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/de
        Source: gNrfORqjCV.exe, 00000000.00000003.297957541.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cna-e
        Source: gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnani
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298448695.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnicr
        Source: gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnno
        Source: gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cntra
        Source: gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/Z
        Source: gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/n
        Source: gNrfORqjCV.exe, 00000000.00000003.307784164.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: gNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/:
        Source: gNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302024144.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302116093.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
        Source: gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/u
        Source: gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/g
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: gNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/-
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/:
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/H
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/g
        Source: gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/u
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/kurs
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t-i
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/u
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/~
        Source: gNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: gNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.come
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: gNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krX
        Source: gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kra-d
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnde
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cni
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnlg
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
        Source: unknownDNS traffic detected: queries for: nonoise.duckdns.org
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR

        System Summary

        barindex
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.29cf1b4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.29ae42c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 15.2.dhcpmon.exe.2f69510.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 15.2.dhcpmon.exe.2f664f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 15.2.dhcpmon.exe.2f67504.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5320, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: gNrfORqjCV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.29cf1b4.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.29ae42c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 15.2.dhcpmon.exe.2f69510.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 15.2.dhcpmon.exe.2f664f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 15.2.dhcpmon.exe.2f67504.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5320, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_0265C2140_2_0265C214
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_0265E6480_2_0265E648
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_0265E6580_2_0265E658
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E2273C0_2_07E2273C
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E200400_2_07E20040
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E200070_2_07E20007
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_0286C2147_2_0286C214
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_0286E6487_2_0286E648
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_0286E6587_2_0286E658
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B00067_2_053B0006
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B50417_2_053B5041
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B00407_2_053B0040
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B9B287_2_053B9B28
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B02E07_2_053B02E0
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B02D17_2_053B02D1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_02EEE4808_2_02EEE480
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_02EEE4718_2_02EEE471
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_02EEBBD48_2_02EEBBD4
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_06C100408_2_06C10040
        Source: gNrfORqjCV.exeBinary or memory string: OriginalFilename vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000002.381347692.0000000007040000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000003.318367958.0000000007201000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoWRc.exe> vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000002.356107386.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000000.292278061.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoWRc.exe> vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000008.00000002.568193972.0000000004081000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 0000000E.00000002.425767553.0000000004195000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000002DFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 0000000E.00000002.425767553.0000000004203000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exeBinary or memory string: OriginalFilenameoWRc.exe> vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: GzGmImHFmOq.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: gNrfORqjCV.exeReversingLabs: Detection: 64%
        Source: gNrfORqjCV.exeVirustotal: Detection: 58%
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile read: C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: gNrfORqjCV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmpJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmpJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmpJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmpJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Users\user\AppData\Local\Temp\tmp78F4.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@37/23@20/2
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: gNrfORqjCV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5684:120:WilError_01
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{cb7cb109-a06b-4fd7-8d0e-5290e77da5a5}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_01
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMutant created: \Sessions\1\BaseNamedObjects\nPnroCzUduJadCsbkbUABOtLLtA
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5244:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1640:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4720:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5228:120:WilError_01
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: gNrfORqjCV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: gNrfORqjCV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: gNrfORqjCV.exe, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: GzGmImHFmOq.exe.0.dr, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.gNrfORqjCV.exe.430000.0.unpack, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.8.dr, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E23603 push ebp; retf 0_2_07E23609
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_07893BCF push FFFFFF8Bh; iretd 7_2_07893BDF
        Source: initial sampleStatic PE information: section name: .text entropy: 7.680692465060209
        Source: initial sampleStatic PE information: section name: .text entropy: 7.680692465060209
        Source: initial sampleStatic PE information: section name: .text entropy: 7.680692465060209
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to dropped file
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile opened: C:\Users\user\Desktop\gNrfORqjCV.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.29cf1b4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.29ae42c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.2f69510.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.2f664f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.2f67504.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4544, type: MEMORYSTR
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003043000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003043000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 5668Thread sleep time: -37665s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 5544Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1640Thread sleep time: -8301034833169293s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2492Thread sleep count: 9432 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1812Thread sleep time: -2767011611056431s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe TID: 5008Thread sleep time: -37665s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe TID: 4700Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 6032Thread sleep time: -16602069666338586s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 472Thread sleep time: -37665s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 4136Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1712Thread sleep time: -37665s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5020Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4276Thread sleep count: 9255 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2552Thread sleep time: -12912720851596678s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2816Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6016Thread sleep time: -37665s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4760Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 5100Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe TID: 748Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9315Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9432Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeWindow / User API: threadDelayed 9459Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeWindow / User API: foregroundWindowGot 732Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9255
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8922
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 37665Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 37665Jump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 37665
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMemory written: C:\Users\user\Desktop\gNrfORqjCV.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMemory written: C:\Users\user\Desktop\gNrfORqjCV.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmpJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmpJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmpJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmpJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003100000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.561827065.00000000033E3000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.575711406.000000000747E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003183000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHaVph
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: gNrfORqjCV.exe, 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: GzGmImHFmOq.exe, 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: gNrfORqjCV.exe, 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: GzGmImHFmOq.exe, 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: GzGmImHFmOq.exe, 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        112
        Process Injection
        2
        Masquerading
        11
        Input Capture
        21
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingData Transfer Size Limits21
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials12
        System Information Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items3
        Obfuscated Files or Information
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 800437 Sample: gNrfORqjCV.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 79 Malicious sample detected (through community Yara rule) 2->79 81 Antivirus detection for URL or domain 2->81 83 Multi AV Scanner detection for dropped file 2->83 85 12 other signatures 2->85 8 gNrfORqjCV.exe 7 2->8         started        12 gNrfORqjCV.exe 2->12         started        14 GzGmImHFmOq.exe 5 2->14         started        16 2 other processes 2->16 process3 file4 67 C:\Users\user\AppData\...behaviorgraphzGmImHFmOq.exe, PE32 8->67 dropped 69 C:\Users\...behaviorgraphzGmImHFmOq.exe:Zone.Identifier, ASCII 8->69 dropped 71 C:\Users\user\AppData\Local\...\tmp78F4.tmp, XML 8->71 dropped 73 C:\Users\user\AppData\...\gNrfORqjCV.exe.log, ASCII 8->73 dropped 89 Uses schtasks.exe or at.exe to add and modify task schedules 8->89 91 Adds a directory exclusion to Windows Defender 8->91 93 Injects a PE file into a foreign processes 8->93 18 gNrfORqjCV.exe 1 12 8->18         started        23 powershell.exe 21 8->23         started        25 powershell.exe 21 8->25         started        27 schtasks.exe 1 8->27         started        29 powershell.exe 12->29         started        31 powershell.exe 12->31         started        33 schtasks.exe 12->33         started        35 gNrfORqjCV.exe 12->35         started        95 Multi AV Scanner detection for dropped file 14->95 97 Machine Learning detection for dropped file 14->97 37 2 other processes 14->37 signatures5 process6 dnsIp7 75 nonoise.duckdns.org 194.5.98.24, 49701, 49702, 49705 DANILENKODE Netherlands 18->75 77 127.0.0.1 unknown unknown 18->77 61 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->61 dropped 63 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 18->63 dropped 65 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->65 dropped 87 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->87 39 schtasks.exe 18->39         started        41 schtasks.exe 18->41         started        43 conhost.exe 23->43         started        45 conhost.exe 25->45         started        47 conhost.exe 27->47         started        49 conhost.exe 29->49         started        51 conhost.exe 31->51         started        53 conhost.exe 33->53         started        55 conhost.exe 37->55         started        file8 signatures9 process10 process11 57 conhost.exe 39->57         started        59 conhost.exe 41->59         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        gNrfORqjCV.exe64%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        gNrfORqjCV.exe59%VirustotalBrowse
        gNrfORqjCV.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe64%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe64%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        SourceDetectionScannerLabelLinkDownload
        23.2.gNrfORqjCV.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.gNrfORqjCV.exe.5a70000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        SourceDetectionScannerLabelLink
        nonoise.duckdns.org4%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://www.fontbureau.comessed0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/:0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/-0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.fontbureau.comalso0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comcomd0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
        http://en.w0%URL Reputationsafe
        http://www.fontbureau.comd$0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/-0%URL Reputationsafe
        http://www.founder.com.cn/cnicr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/H0%URL Reputationsafe
        http://www.founder.com.cn/cna-e0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/kurs0%VirustotalBrowse
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/:0%URL Reputationsafe
        http://www.founder.com.cn/cnno0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.fontbureau.comony0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.carterandcone.comC0%URL Reputationsafe
        http://www.fontbureau.comB.TTF0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/g0%URL Reputationsafe
        http://www.fontbureau.comcom0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sajatypeworks.come0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.fontbureau.comf0%URL Reputationsafe
        http://www.fontbureau.comessedQ0%Avira URL Cloudsafe
        nonoise.duckdns.org100%Avira URL Cloudmalware
        http://www.fontbureau.comalsFu0%Avira URL Cloudsafe
        http://www.sandoll.co.kra-d0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/kurs0%Avira URL Cloudsafe
        http://www.sandoll.co.krX0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0/u0%Avira URL Cloudsafe
        http://www.fontbureau.comFu0%Avira URL Cloudsafe
        http://www.founder.com.cn/cntra0%Avira URL Cloudsafe
        http://www.fontbureau.comalicS0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cni0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnani0%Avira URL Cloudsafe
        http://www.fontbureau.comuevo0%Avira URL Cloudsafe
        http://www.carterandcone.com.T0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnlg0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/t-i0%Avira URL Cloudsafe
        http://www.carterandcone.comTCH0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/n0%Avira URL Cloudsafe
        http://www.carterandcone.como.p0%Avira URL Cloudsafe
        http://www.fontbureau.comFH0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/de0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnde0%Avira URL Cloudsafe
        http://www.carterandcone.coms00%Avira URL Cloudsafe
        http://www.galapagosdesign.com/Z0%Avira URL Cloudsafe
        127.0.0.10%Avira URL Cloudsafe
        http://www.carterandcone.comlg0%Avira URL Cloudsafe
        http://www.fontbureau.comdy0%Avira URL Cloudsafe
        http://www.carterandcone.comde0%Avira URL Cloudsafe
        http://www.carterandcone.comego0%Avira URL Cloudsafe
        http://www.carterandcone.comsb0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        nonoise.duckdns.org
        194.5.98.24
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        nonoise.duckdns.orgtrue
        • Avira URL Cloud: malware
        unknown
        127.0.0.1true
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.sandoll.co.kra-dgNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.comd$gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306618063.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306685172.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://www.fontbureau.com/designersgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.comessedgNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/kursgNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.comalsFugNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comgNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cThegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/:gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.sandoll.co.krXgNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/-gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.galapagosdesign.com/DPleasegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlgNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comalsogNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.urwpp.deDPleasegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cngNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namegNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003046000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.carterandcone.como.gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comessedQgNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0/ugNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.galapagosdesign.com/gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cntragNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comcomdgNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/HgNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersnogNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/CgNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302024144.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302116093.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://en.wgNrfORqjCV.exe, 00000000.00000003.296515775.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296396139.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnigNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.carterandcone.comlgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comFugNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305277458.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305332327.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305058105.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305393745.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers/frere-jones.htmlgNrfORqjCV.exe, 00000000.00000003.304656866.00000000057F4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057F3000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comalicSgNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/ugNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/tgNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/-gNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnicrgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298448695.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.com.TgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/ggNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersGgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersFgNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comuevogNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cn/bThegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/jp/HgNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnanigNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cna-egNrfORqjCV.exe, 00000000.00000003.297957541.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comFHgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.comgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cndegNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.zhongyicts.com.cnlggNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.goodfont.co.krgNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comgNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/degNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comTCHgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/:gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersTgNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cnnogNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/~gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersRgNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.typography.netDgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.como.pgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comonygNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmgNrfORqjCV.exe, 00000000.00000003.307784164.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comgNrfORqjCV.exe, 00000000.00000003.295899082.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296138391.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296240339.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295949444.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296360113.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296039310.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296275045.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295980858.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296109893.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296305097.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/ngNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/t-igNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designerslgNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.carterandcone.comCgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comB.TTFgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/ggNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comcomgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersegNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designersbgNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krgNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designerspgNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sajatypeworks.comegNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.coms0gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designerssgNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.comgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comTCgNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comdygNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.carterandcone.comegogNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.galapagosdesign.com/ZgNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comiongNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comdegNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/jp/ugNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/jp/gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comdgNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comlggNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cngNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.comfgNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.carterandcone.comsbgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              194.5.98.24
                                              nonoise.duckdns.orgNetherlands
                                              208476DANILENKODEtrue
                                              IP
                                              127.0.0.1
                                              Joe Sandbox Version:36.0.0 Rainbow Opal
                                              Analysis ID:800437
                                              Start date and time:2023-02-07 13:54:09 +01:00
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 10m 23s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:30
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample file name:gNrfORqjCV.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@37/23@20/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HDC Information:
                                              • Successful, ratio: 0.9% (good quality ratio 0.8%)
                                              • Quality average: 67.6%
                                              • Quality standard deviation: 33.2%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 73
                                              • Number of non-executed functions: 6
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
                                              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ctldl.windowsupdate.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              13:55:12API Interceptor731x Sleep call for process: gNrfORqjCV.exe modified
                                              13:55:20API Interceptor148x Sleep call for process: powershell.exe modified
                                              13:55:22Task SchedulerRun new task: GzGmImHFmOq path: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              13:55:31Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\gNrfORqjCV.exe" s>$(Arg0)
                                              13:55:32Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                              13:55:35AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              13:55:40API Interceptor2x Sleep call for process: dhcpmon.exe modified
                                              13:55:42API Interceptor1x Sleep call for process: GzGmImHFmOq.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              194.5.98.24voestalpine sipari#U015f formu hk-CEL0929BD, pdf.exeGet hashmaliciousBrowse
                                                NEW ORDER 546576775643, pdf.exeGet hashmaliciousBrowse
                                                  Yeni sipari#U015f _WJO-010222. pdf.exeGet hashmaliciousBrowse
                                                    32INVITATION LETTER.pdf.exeGet hashmaliciousBrowse
                                                      5Invited Partners for Emergency Meeting.pdf.exeGet hashmaliciousBrowse
                                                        60Incentive Breakdown.pdf.exeGet hashmaliciousBrowse
                                                          12UNPAID COMMISSION.pdf.exeGet hashmaliciousBrowse
                                                            84master file for commission.pdf.exeGet hashmaliciousBrowse
                                                              39DSTV ACTIVATION TEMPLATE FOR DECEMBER.pdf.exeGet hashmaliciousBrowse
                                                                9OUTSTANDING INVOICES FOR SECURED CREDIT AS AT 5TH JAN 2019.pdf.exeGet hashmaliciousBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  nonoise.duckdns.orgSHIPMENT NOTIFICATION- EXPORTERS& IMPORTERS SCHEDULED DATE AVAILABLE..exeGet hashmaliciousBrowse
                                                                  • 194.5.98.20
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  DANILENKODEScan Copy.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.186
                                                                  IMAGE119.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.12
                                                                  dlwat.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.202
                                                                  FAKTURA D.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.210
                                                                  Scan Copy.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.174
                                                                  scan_2023748984785874774.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.245
                                                                  BookingDetails77#6276.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.120
                                                                  DOCUMENT839$#789.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.120
                                                                  9E9C786810231BB2222BE822FBD43E21A02AF06B96C6C.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.212
                                                                  Fully Executed Contract.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.71
                                                                  PROFORMA INVOICE SCAN DOC.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.53
                                                                  SIBAIRQ-PD-PUR-926.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.71
                                                                  Payload.exe.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.13
                                                                  DTQ112.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.42
                                                                  Proforma Invoice 3001855006.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.42
                                                                  EFT20009563_invoice.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.253
                                                                  MDCT091.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.109
                                                                  Inquiry for Quotation No. 20P3200023.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.212
                                                                  Shipping Doc.pdf.exeGet hashmaliciousBrowse
                                                                  • 194.5.98.9
                                                                  Proforma DA request.jsGet hashmaliciousBrowse
                                                                  • 194.5.98.97
                                                                  No context
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):941568
                                                                  Entropy (8bit):7.676646011154186
                                                                  Encrypted:false
                                                                  SSDEEP:12288:77S45nJrTmHkFrVoaqnS/pjpkH7PRNNiJTp/cuP1FRkkYy27YBp7HwcBVw:nS4PkkFr2QJ6HdaTp081L4y2Qasw
                                                                  MD5:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  SHA1:F8460389F343481D7420073AD1DA2F90DDEDC696
                                                                  SHA-256:5707C702F70CC5BF864E10AAAB48F9300E3BE0A7892D8FAA1810145F0AF93D2D
                                                                  SHA-512:38DE4CFCD5A1E75AF8E730B7F459D545108306BCFE06C2D315FB70B72DD75F550F21E0078F7AE4214D03BBBC5FDD4A3DE8500254534842E6EB8321693F5062C0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 64%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.c..............0..V..........>u... ........@.. ....................................@..................................t..O.................................................................................... ............... ..H............text...DU... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B................ u......H........K...B......-....................................................{....*..{....*V.(......}......}....*...0..C........u........6.,0(.....{.....{....o....,.(.....{.....{....o....+..+..*. ...U )UU.Z(.....{....o....X )UU.Z(.....{....o....X*.0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*&.(......*.0..V........(........}......}.......s"...}......+&...+...{.......(#......X.......-....X.......-.*...0...........rG.
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  Process:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                  Malicious:false
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                  Malicious:false
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                  Malicious:true
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):21748
                                                                  Entropy (8bit):5.600772758637283
                                                                  Encrypted:false
                                                                  SSDEEP:384:LtCRLq0gJcKuAax0rq/3ISVxyjulrItiiJ9glSJuyzSv0ZqbAVrdJQBR3BT+inY8:0KuAaxgUxyClrSSlBBs4wXoY8
                                                                  MD5:13AAEA93CDE8136DA48D5BF09ADF3B60
                                                                  SHA1:0450C3870498BB682CE4010CE9F85A1D6DC8774C
                                                                  SHA-256:C68305D299D55E533CD4DFA704D41EF40C81EB455BE38414FC6458A777A8C0F4
                                                                  SHA-512:460B8B08B988E680BDFD0869B5EB0E862A89099BB60A146F7A3EFA55CA9BDE803028C18FCFED4A5B154955C9A7ED42BD9B8801CD6AAC230E4F072B2CFA61595C
                                                                  Malicious:false
                                                                  Preview:@...e...............................d.7...b..........@..........H...............<@.^.L."My...::..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:U:U
                                                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                  Malicious:false
                                                                  Preview:1
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1301
                                                                  Entropy (8bit):5.111180834949932
                                                                  Encrypted:false
                                                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Pcxtn:cbk4oL600QydbQxIYODOLedq3Scj
                                                                  MD5:205A4E2EE65AB288C6B92DB204349ACF
                                                                  SHA1:2F645852F3AB280F7FC170545EDBC557356DE80E
                                                                  SHA-256:5FBCDCDB9CE1FDCA116227AFE38D307CEA461D64D653BD23F20BA3872EA85B72
                                                                  SHA-512:77550160EAB85A1B52DBCB26F4D6DA3C4BED08DB7E220AC320937EEABFEA3755C0EA0354D691C803CBF8100A96BB67B06C9C30829876BC5EFA7941A02E3331A5
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):1310
                                                                  Entropy (8bit):5.109425792877704
                                                                  Encrypted:false
                                                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                  MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                  SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                  SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                  SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                  Process:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  File Type:XML 1.0 document, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1602
                                                                  Entropy (8bit):5.140535559819237
                                                                  Encrypted:false
                                                                  SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt2xvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT6v
                                                                  MD5:7249F2169DE65C5704FB934EEAF9D7BF
                                                                  SHA1:6A0CB99EB5C1D4ABB0F5A8A6993ABD92DAAC126A
                                                                  SHA-256:A8E9843BC4C116B227EF3AD89E1BE8CB9C501370421504FEB5E82C66C8879247
                                                                  SHA-512:64D47BBC462F714DE847F49C3FF66F0B9880CFBFB0EB8DE3FC8FE657FF12F9922E256225A91EED819A82B97BB5408053B7FBCB7F7889065C535C281F8B9DD82D
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:XML 1.0 document, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1602
                                                                  Entropy (8bit):5.140535559819237
                                                                  Encrypted:false
                                                                  SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt2xvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT6v
                                                                  MD5:7249F2169DE65C5704FB934EEAF9D7BF
                                                                  SHA1:6A0CB99EB5C1D4ABB0F5A8A6993ABD92DAAC126A
                                                                  SHA-256:A8E9843BC4C116B227EF3AD89E1BE8CB9C501370421504FEB5E82C66C8879247
                                                                  SHA-512:64D47BBC462F714DE847F49C3FF66F0B9880CFBFB0EB8DE3FC8FE657FF12F9922E256225A91EED819A82B97BB5408053B7FBCB7F7889065C535C281F8B9DD82D
                                                                  Malicious:true
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:XML 1.0 document, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1602
                                                                  Entropy (8bit):5.140535559819237
                                                                  Encrypted:false
                                                                  SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt2xvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT6v
                                                                  MD5:7249F2169DE65C5704FB934EEAF9D7BF
                                                                  SHA1:6A0CB99EB5C1D4ABB0F5A8A6993ABD92DAAC126A
                                                                  SHA-256:A8E9843BC4C116B227EF3AD89E1BE8CB9C501370421504FEB5E82C66C8879247
                                                                  SHA-512:64D47BBC462F714DE847F49C3FF66F0B9880CFBFB0EB8DE3FC8FE657FF12F9922E256225A91EED819A82B97BB5408053B7FBCB7F7889065C535C281F8B9DD82D
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:ISO-8859 text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8
                                                                  Entropy (8bit):2.75
                                                                  Encrypted:false
                                                                  SSDEEP:3:KF:KF
                                                                  MD5:84F57A2CCBF5202D84064D529BC5F7F1
                                                                  SHA1:48D0C7CADD8EF77664087CAF8474E57C77FAB1AA
                                                                  SHA-256:BC484715C0A8CFC52127533FEFB1FE211599F6FD7CAC1183A15C1449E255DBFD
                                                                  SHA-512:B4AB763748F3F445E55CCF2A85A9684BF392E5903F4F8253C4F61637099419469895DB23C92EF5C9BC0138B325D57A40F75153C638BF371D41EE79AB0DED11CA
                                                                  Malicious:true
                                                                  Preview:.pV.V..H
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):38
                                                                  Entropy (8bit):4.405822250285692
                                                                  Encrypted:false
                                                                  SSDEEP:3:oNUWJRWCfqGi4A:oNNJACfq6A
                                                                  MD5:2C464CA33435236989E7B48201539321
                                                                  SHA1:BF6ED3B301DE5F4AE68C17E4CC826C70DE058248
                                                                  SHA-256:E8D74AB7595A22F57A930F896093E42870EFCF9CC6FF801D97F0E31073B03D28
                                                                  SHA-512:45E51DC7DCDD94F0EE2011AD5AE05A88E3D14825F0F4C46E9B8C55F19C7ECA4D096E28727D0BEA57590E9D02E030F12B001A4C4E53B382671084CA3CB51B7327
                                                                  Malicious:false
                                                                  Preview:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):941568
                                                                  Entropy (8bit):7.676646011154186
                                                                  Encrypted:false
                                                                  SSDEEP:12288:77S45nJrTmHkFrVoaqnS/pjpkH7PRNNiJTp/cuP1FRkkYy27YBp7HwcBVw:nS4PkkFr2QJ6HdaTp081L4y2Qasw
                                                                  MD5:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  SHA1:F8460389F343481D7420073AD1DA2F90DDEDC696
                                                                  SHA-256:5707C702F70CC5BF864E10AAAB48F9300E3BE0A7892D8FAA1810145F0AF93D2D
                                                                  SHA-512:38DE4CFCD5A1E75AF8E730B7F459D545108306BCFE06C2D315FB70B72DD75F550F21E0078F7AE4214D03BBBC5FDD4A3DE8500254534842E6EB8321693F5062C0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 64%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.c..............0..V..........>u... ........@.. ....................................@..................................t..O.................................................................................... ............... ..H............text...DU... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B................ u......H........K...B......-....................................................{....*..{....*V.(......}......}....*...0..C........u........6.,0(.....{.....{....o....,.(.....{.....{....o....+..+..*. ...U )UU.Z(.....{....o....X )UU.Z(.....{....o....X*.0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*&.(......*.0..V........(........}......}.......s"...}......+&...+...{.......(#......X.......-....X.......-.*...0...........rG.
                                                                  Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.676646011154186
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                  File name:gNrfORqjCV.exe
                                                                  File size:941568
                                                                  MD5:60c8d91adfa30a60afa2f5437ce7d041
                                                                  SHA1:f8460389f343481d7420073ad1da2f90ddedc696
                                                                  SHA256:5707c702f70cc5bf864e10aaab48f9300e3be0a7892d8faa1810145f0af93d2d
                                                                  SHA512:38de4cfcd5a1e75af8e730b7f459d545108306bcfe06c2d315fb70b72dd75f550f21e0078f7ae4214d03bbbc5fdd4a3de8500254534842e6eb8321693f5062c0
                                                                  SSDEEP:12288:77S45nJrTmHkFrVoaqnS/pjpkH7PRNNiJTp/cuP1FRkkYy27YBp7HwcBVw:nS4PkkFr2QJ6HdaTp081L4y2Qasw
                                                                  TLSH:82159D5119AB43E6ECF98D7832B8E61826A28CD2476D9D3EBC863D7A8CF370F4451711
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.c..............0..V..........>u... ........@.. ....................................@................................
                                                                  Icon Hash:00828e8e8686b000
                                                                  Entrypoint:0x4e753e
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x63C94CB9 [Thu Jan 19 13:59:21 2023 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe74ec0x4f.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x3a4.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000xe55440xe5600False0.8197239015667575data7.680692465060209IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xe80000x3a40x400False0.3837890625data2.942309763240296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xea0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_VERSION0xe80580x348data
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Feb 7, 2023 13:55:35.385148048 CET497016060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:55:35.746256113 CET606049701194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:55:36.263089895 CET497016060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:55:36.502480984 CET606049701194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:55:37.060009956 CET497016060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:55:37.292237043 CET606049701194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:55:45.062972069 CET497026060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:55:45.285547972 CET606049702194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:55:45.967027903 CET497026060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:55:46.183325052 CET606049702194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:55:46.764082909 CET497026060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:55:46.995682001 CET606049702194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:08.145855904 CET497056060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:08.364366055 CET606049705194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:08.953275919 CET497056060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:09.165040970 CET606049705194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:09.765851021 CET497056060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:09.983294964 CET606049705194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:39.798890114 CET497126060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:40.003993034 CET606049712194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:40.518403053 CET497126060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:40.723225117 CET606049712194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:41.228743076 CET497126060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:41.443243027 CET606049712194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:54.732409954 CET497136060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:57.188936949 CET606049713194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:57.863878965 CET497136060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:58.096165895 CET606049713194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:56:58.598249912 CET497136060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:56:58.812616110 CET606049713194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:57:02.917262077 CET497156060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:57:05.326845884 CET606049715194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:57:05.842473984 CET497156060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:57:07.717140913 CET606049715194.5.98.24192.168.2.5
                                                                  Feb 7, 2023 13:57:08.230956078 CET497156060192.168.2.5194.5.98.24
                                                                  Feb 7, 2023 13:57:12.010140896 CET606049715194.5.98.24192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Feb 7, 2023 13:55:34.256066084 CET6064953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:55:35.317756891 CET6064953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:55:35.370954037 CET536064984.200.69.80192.168.2.5
                                                                  Feb 7, 2023 13:55:44.998558044 CET5144153192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:55:45.034903049 CET535144184.200.69.80192.168.2.5
                                                                  Feb 7, 2023 13:55:53.838025093 CET4972453192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:55:54.828720093 CET4972453192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:55:57.980149031 CET4972453192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:55:59.984153032 CET4972453192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:04.031718969 CET4972453192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:08.101353884 CET6532353192.168.2.584.200.70.40
                                                                  Feb 7, 2023 13:56:08.142416954 CET536532384.200.70.40192.168.2.5
                                                                  Feb 7, 2023 13:56:31.261082888 CET5503953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:32.283844948 CET5503953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:33.328063011 CET5503953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:35.691873074 CET5503953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:39.746449947 CET5503953192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:39.797384977 CET535503984.200.69.80192.168.2.5
                                                                  Feb 7, 2023 13:56:45.474669933 CET6097553192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:46.489002943 CET6097553192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:47.535037041 CET6097553192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:49.536046982 CET6097553192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:53.621021986 CET6097553192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:56:53.668188095 CET536097584.200.69.80192.168.2.5
                                                                  Feb 7, 2023 13:57:02.882363081 CET5506853192.168.2.584.200.69.80
                                                                  Feb 7, 2023 13:57:02.916222095 CET535506884.200.69.80192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Feb 7, 2023 13:55:34.256066084 CET192.168.2.584.200.69.800x9980Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:35.317756891 CET192.168.2.584.200.69.800x9980Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:44.998558044 CET192.168.2.584.200.69.800x64c6Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:53.838025093 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:54.828720093 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:57.980149031 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:59.984153032 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:04.031718969 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:08.101353884 CET192.168.2.584.200.70.400x8c8Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:31.261082888 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:32.283844948 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:33.328063011 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:35.691873074 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:39.746449947 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:45.474669933 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:46.489002943 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:47.535037041 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:49.536046982 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:53.621021986 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:57:02.882363081 CET192.168.2.584.200.69.800x8867Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Feb 7, 2023 13:55:35.370954037 CET84.200.69.80192.168.2.50x9980No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:55:45.034903049 CET84.200.69.80192.168.2.50x64c6No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:08.142416954 CET84.200.70.40192.168.2.50x8c8No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:39.797384977 CET84.200.69.80192.168.2.50x790fNo error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:56:53.668188095 CET84.200.69.80192.168.2.50x7de9No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                                                  Feb 7, 2023 13:57:02.916222095 CET84.200.69.80192.168.2.50x8867No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:13:55:01
                                                                  Start date:07/02/2023
                                                                  Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Imagebase:0x430000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low

                                                                  Target ID:1
                                                                  Start time:13:55:13
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Imagebase:0xf00000
                                                                  File size:430592 bytes
                                                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Reputation:high

                                                                  Target ID:2
                                                                  Start time:13:55:13
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:3
                                                                  Start time:13:55:14
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  Imagebase:0xf00000
                                                                  File size:430592 bytes
                                                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Reputation:high

                                                                  Target ID:4
                                                                  Start time:13:55:14
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:5
                                                                  Start time:13:55:14
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp
                                                                  Imagebase:0xcc0000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:6
                                                                  Start time:13:55:14
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:7
                                                                  Start time:13:55:22
                                                                  Start date:07/02/2023
                                                                  Path:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  Imagebase:0x530000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 64%, ReversingLabs
                                                                  Reputation:low

                                                                  Target ID:8
                                                                  Start time:13:55:25
                                                                  Start date:07/02/2023
                                                                  Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Imagebase:0xbb0000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  Reputation:low

                                                                  Target ID:10
                                                                  Start time:13:55:30
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp
                                                                  Imagebase:0xcc0000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:11
                                                                  Start time:13:55:30
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:12
                                                                  Start time:13:55:31
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp
                                                                  Imagebase:0xcc0000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:13
                                                                  Start time:13:55:31
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:14
                                                                  Start time:13:55:32
                                                                  Start date:07/02/2023
                                                                  Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe 0
                                                                  Imagebase:0x820000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                                                  Target ID:15
                                                                  Start time:13:55:32
                                                                  Start date:07/02/2023
                                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                                                  Imagebase:0x740000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 64%, ReversingLabs

                                                                  Target ID:16
                                                                  Start time:13:55:43
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Imagebase:0xf00000
                                                                  File size:430592 bytes
                                                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET

                                                                  Target ID:17
                                                                  Start time:13:55:43
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:18
                                                                  Start time:13:55:43
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  Imagebase:0xf00000
                                                                  File size:430592 bytes
                                                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET

                                                                  Target ID:19
                                                                  Start time:13:55:43
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:20
                                                                  Start time:13:55:43
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
                                                                  Imagebase:0xcc0000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:21
                                                                  Start time:13:55:43
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:22
                                                                  Start time:13:55:44
                                                                  Start date:07/02/2023
                                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                                                  Imagebase:0xc10000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:.Net C# or VB.NET

                                                                  Target ID:23
                                                                  Start time:13:55:50
                                                                  Start date:07/02/2023
                                                                  Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe
                                                                  Imagebase:0x4e0000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                                                  Target ID:26
                                                                  Start time:13:56:04
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp
                                                                  Imagebase:0xcc0000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:27
                                                                  Start time:13:56:04
                                                                  Start date:07/02/2023
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7fcd70000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:28
                                                                  Start time:13:56:07
                                                                  Start date:07/02/2023
                                                                  Path:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                                                  Imagebase:0xc50000
                                                                  File size:941568 bytes
                                                                  MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:12.8%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:123
                                                                    Total number of Limit Nodes:8
                                                                    execution_graph 15923 2659270 15924 265927f 15923->15924 15927 2659761 15923->15927 15936 2659770 15923->15936 15928 2659783 15927->15928 15930 265979b 15928->15930 15945 2659a53 15928->15945 15950 26599f8 15928->15950 15954 26599e9 15928->15954 15929 2659793 15929->15930 15931 2659998 GetModuleHandleW 15929->15931 15930->15924 15932 26599c5 15931->15932 15932->15924 15937 2659783 15936->15937 15938 265979b 15937->15938 15942 2659a53 LoadLibraryExW 15937->15942 15943 26599e9 LoadLibraryExW 15937->15943 15944 26599f8 LoadLibraryExW 15937->15944 15938->15924 15939 2659793 15939->15938 15940 2659998 GetModuleHandleW 15939->15940 15941 26599c5 15940->15941 15941->15924 15942->15939 15943->15939 15944->15939 15946 2659a28 15945->15946 15949 2659a57 15945->15949 15958 2659388 15946->15958 15951 2659a0c 15950->15951 15952 2659a31 15951->15952 15953 2659388 LoadLibraryExW 15951->15953 15952->15929 15953->15952 15956 2659a0c 15954->15956 15955 2659a31 15955->15929 15956->15955 15957 2659388 LoadLibraryExW 15956->15957 15957->15955 15959 2659bd8 LoadLibraryExW 15958->15959 15961 2659a31 15959->15961 15961->15929 15962 265b770 15963 265b7d6 15962->15963 15967 265b930 15963->15967 15970 265b923 15963->15970 15964 265b885 15968 265b95e 15967->15968 15973 2659710 15967->15973 15968->15964 15971 2659710 DuplicateHandle 15970->15971 15972 265b95e 15971->15972 15972->15964 15974 265b998 DuplicateHandle 15973->15974 15975 265ba2e 15974->15975 15975->15968 15976 26540d0 15977 26540e2 15976->15977 15978 26540ee 15977->15978 15982 26541e0 15977->15982 15987 2653c64 15978->15987 15980 265410d 15983 2654205 15982->15983 15991 26542e0 15983->15991 15995 26542d0 15983->15995 15988 2653c6f 15987->15988 16003 26551a4 15988->16003 15990 2656ae5 15990->15980 15993 2654307 15991->15993 15992 26543e4 15993->15992 15999 2653de4 15993->15999 15996 2654307 15995->15996 15997 26543e4 15996->15997 15998 2653de4 CreateActCtxA 15996->15998 15998->15997 16000 2655370 CreateActCtxA 15999->16000 16002 2655433 16000->16002 16002->16002 16004 26551af 16003->16004 16007 2655808 16004->16007 16006 2656b95 16006->15990 16008 2655813 16007->16008 16011 2655838 16008->16011 16010 2656c7a 16010->16006 16012 2655843 16011->16012 16015 2655868 16012->16015 16014 2656d6a 16014->16010 16016 2655873 16015->16016 16018 2657229 16016->16018 16022 26574cb 16016->16022 16017 26574bc 16017->16014 16018->16017 16027 265b390 16018->16027 16032 265b3a0 16018->16032 16023 265749f 16022->16023 16024 26574bc 16023->16024 16025 265b3a0 4 API calls 16023->16025 16026 265b390 4 API calls 16023->16026 16024->16018 16025->16024 16026->16024 16028 265b3c1 16027->16028 16029 265b3e5 16028->16029 16037 265b647 16028->16037 16041 265b658 16028->16041 16029->16017 16033 265b3c1 16032->16033 16034 265b3e5 16033->16034 16035 265b647 4 API calls 16033->16035 16036 265b658 4 API calls 16033->16036 16034->16017 16035->16034 16036->16034 16039 265b665 16037->16039 16040 265b69f 16039->16040 16045 2659688 16039->16045 16040->16029 16042 265b665 16041->16042 16043 265b69f 16042->16043 16044 2659688 4 API calls 16042->16044 16043->16029 16044->16043 16046 2659693 16045->16046 16048 265c398 16046->16048 16049 265bf58 16046->16049 16048->16048 16050 265bf63 16049->16050 16051 2655868 4 API calls 16050->16051 16052 265c407 16050->16052 16051->16052 16056 265e190 16052->16056 16064 265e178 16052->16064 16053 265c440 16053->16048 16057 265e1c1 16056->16057 16060 265e2b2 16056->16060 16058 265e1cd 16057->16058 16063 265e610 LoadLibraryExW GetModuleHandleW 16057->16063 16058->16053 16059 265e20d 16061 265efc8 CreateWindowExW CreateWindowExW 16059->16061 16062 265efd8 CreateWindowExW CreateWindowExW 16059->16062 16060->16053 16061->16060 16062->16060 16063->16059 16066 265e1c1 16064->16066 16068 265e2b2 16064->16068 16065 265e1cd 16065->16053 16066->16065 16071 265e610 LoadLibraryExW GetModuleHandleW 16066->16071 16067 265e20d 16069 265efc8 CreateWindowExW CreateWindowExW 16067->16069 16070 265efd8 CreateWindowExW CreateWindowExW 16067->16070 16068->16053 16069->16068 16070->16068 16071->16067 15917 7e28048 15918 7e281d3 15917->15918 15919 7e2806e 15917->15919 15919->15918 15921 7e282c8 PostMessageW 15919->15921 15922 7e28334 15921->15922 15922->15919
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.391152313.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7e20000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9e34c4526d5cf431054a6db0ae0354d6cc130587fb4669b93445a262f18f26ae
                                                                    • Instruction ID: 0011ea030823e48634a17e63e435ef475de4c02c87f18184923fe9418bee5108
                                                                    • Opcode Fuzzy Hash: 9e34c4526d5cf431054a6db0ae0354d6cc130587fb4669b93445a262f18f26ae
                                                                    • Instruction Fuzzy Hash: 23E046B991A124CFCB109FA5E8044F8F7BCEB8F352F00B0A2C60DA7211DB305A469A00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.391152313.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7e20000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0229a16e30643c645c324c9a31210657babaeae245735e8d74a2a8d8d17ca532
                                                                    • Instruction ID: d3f391394a6d769d026054e49774e9823b5e59c0aa00d305ef3fe2529beb0424
                                                                    • Opcode Fuzzy Hash: 0229a16e30643c645c324c9a31210657babaeae245735e8d74a2a8d8d17ca532
                                                                    • Instruction Fuzzy Hash: 5CC09BA7E9F034D6C5400C9968110F5E77D85CB0B2D017072C31DA3401C920425B2154
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: af51ba89bbf79a86735d5a1e8a85eda1b422cae36628b0941b99e4d20eba271a
                                                                    • Instruction ID: 6c55d153781e9f811fb48b7aaa9158a86456b8665b256ad55b852e294d7589d3
                                                                    • Opcode Fuzzy Hash: af51ba89bbf79a86735d5a1e8a85eda1b422cae36628b0941b99e4d20eba271a
                                                                    • Instruction Fuzzy Hash: F19162B1C093889FDB12CFA4C8909DDBFB1EF4B300F5A819AE454AB6A2D7344946CB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 22 2659770-2659778 23 2659783-2659785 22->23 24 265977e call 26582ec 22->24 25 2659787 23->25 26 265979b-265979f 23->26 24->23 75 265978d call 2659a53 25->75 76 265978d call 26599e9 25->76 77 265978d call 26599f8 25->77 27 26597a1-26597ab 26->27 28 26597b3-26597f4 26->28 27->28 33 26597f6-26597fe 28->33 34 2659801-265980f 28->34 29 2659793-2659795 29->26 30 26598d0-2659990 29->30 70 2659992-2659995 30->70 71 2659998-26599c3 GetModuleHandleW 30->71 33->34 36 2659811-2659816 34->36 37 2659833-2659835 34->37 39 2659821 36->39 40 2659818-265981f call 26582f8 36->40 38 2659838-265983f 37->38 42 2659841-2659849 38->42 43 265984c-2659853 38->43 44 2659823-2659831 39->44 40->44 42->43 47 2659855-265985d 43->47 48 2659860-2659869 call 2658308 43->48 44->38 47->48 53 2659876-265987b 48->53 54 265986b-2659873 48->54 55 265987d-2659884 53->55 56 2659899-265989d 53->56 54->53 55->56 58 2659886-2659896 call 2658318 call 265935c 55->58 78 26598a0 call 2659cd0 56->78 79 26598a0 call 2659d00 56->79 58->56 59 26598a3-26598a6 61 26598c9-26598cf 59->61 62 26598a8-26598c6 59->62 62->61 70->71 72 26599c5-26599cb 71->72 73 26599cc-26599e0 71->73 72->73 75->29 76->29 77->29 78->59 79->59
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 026599B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 922af7a46c32cc885f94e04436bf38ff440539faa7351735018434a137682ed3
                                                                    • Instruction ID: 7229d2b164dbf1456b14bb1db614eded7fd8a6da74a6bf7a6bb0b6575967d911
                                                                    • Opcode Fuzzy Hash: 922af7a46c32cc885f94e04436bf38ff440539faa7351735018434a137682ed3
                                                                    • Instruction Fuzzy Hash: 8D7122B0A01B158FDB24CF6AD05079ABBF1BF88304F00892ED88AD7B50D738E845CB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 80 265dd28-265fe3e 83 265fe40-265fe46 80->83 84 265fe49-265fe50 80->84 83->84 85 265fe52-265fe58 84->85 86 265fe5b-265fe93 84->86 85->86 87 265fe9b-265fefa CreateWindowExW 86->87 88 265ff03-265ff3b 87->88 89 265fefc-265ff02 87->89 93 265ff3d-265ff40 88->93 94 265ff48 88->94 89->88 93->94 95 265ff49 94->95 95->95
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0265FEEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: cd64f8480ef8f7ead51cd7076972e940f8b084843d1377fefb5919e5227de547
                                                                    • Instruction ID: 774457114cb4956022f936b626206746c359791f267c6f38eaa87c74fceb24e5
                                                                    • Opcode Fuzzy Hash: cd64f8480ef8f7ead51cd7076972e940f8b084843d1377fefb5919e5227de547
                                                                    • Instruction Fuzzy Hash: F05113B1C00359EFDB15CFA9C880ADEBFB5BF49310F24812AE819AB251D7749846CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 96 265fdcc-265fe3e 97 265fe40-265fe46 96->97 98 265fe49-265fe50 96->98 97->98 99 265fe52-265fe58 98->99 100 265fe5b-265fe93 98->100 99->100 101 265fe9b-265fefa CreateWindowExW 100->101 102 265ff03-265ff3b 101->102 103 265fefc-265ff02 101->103 107 265ff3d-265ff40 102->107 108 265ff48 102->108 103->102 107->108 109 265ff49 108->109 109->109
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0265FEEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: d53ad3496573f23d18b0d1bff80e9b60c0cf9f0a82b14ecd4f935c8be25b8998
                                                                    • Instruction ID: 1974aa936158075083cd797ab0d7525b760fffb9add5ac0097524324ec903da3
                                                                    • Opcode Fuzzy Hash: d53ad3496573f23d18b0d1bff80e9b60c0cf9f0a82b14ecd4f935c8be25b8998
                                                                    • Instruction Fuzzy Hash: 4F51D0B1D00319AFDB14CFA9C884ADEFBB5BF49710F64812AE819AB610D7749945CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 110 265dd44-265fe3e 112 265fe40-265fe46 110->112 113 265fe49-265fe50 110->113 112->113 114 265fe52-265fe58 113->114 115 265fe5b-265fefa CreateWindowExW 113->115 114->115 117 265ff03-265ff3b 115->117 118 265fefc-265ff02 115->118 122 265ff3d-265ff40 117->122 123 265ff48 117->123 118->117 122->123 124 265ff49 123->124 124->124
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0265FEEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: 97a224f2020d5fb888b02db0b5378c049907f46ff6f4d50db5b40cd6fa109087
                                                                    • Instruction ID: a1ed322d4d99e1f96d055249d21d9ff371eac1ea81671b7a3f0bdcab13ac3104
                                                                    • Opcode Fuzzy Hash: 97a224f2020d5fb888b02db0b5378c049907f46ff6f4d50db5b40cd6fa109087
                                                                    • Instruction Fuzzy Hash: 4C51DEB1D00319EFDB14CF9AC884ADEFBB5BF49710F24812AE819AB610D7749885CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 125 2653de4-2655431 CreateActCtxA 128 2655433-2655439 125->128 129 265543a-2655494 125->129 128->129 136 2655496-2655499 129->136 137 26554a3-26554a7 129->137 136->137 138 26554a9-26554b5 137->138 139 26554b8 137->139 138->139 140 26554b9 139->140 140->140
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 02655421
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: 4c934a90b7652b3bcbf14b97fd060170d5edeaf1bd2d7aa136b09d03f1b1df76
                                                                    • Instruction ID: 20f43b6d0a50f4e7b9ecd1c6116d329734f942e9ddf6c7f6a7a24088501589bd
                                                                    • Opcode Fuzzy Hash: 4c934a90b7652b3bcbf14b97fd060170d5edeaf1bd2d7aa136b09d03f1b1df76
                                                                    • Instruction Fuzzy Hash: 3141D271C0022CCFDB24DFA9C94879EBBB5BF48304F508069D809BB251D7B56945CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 142 265536f-2655431 CreateActCtxA 144 2655433-2655439 142->144 145 265543a-2655494 142->145 144->145 152 2655496-2655499 145->152 153 26554a3-26554a7 145->153 152->153 154 26554a9-26554b5 153->154 155 26554b8 153->155 154->155 156 26554b9 155->156 156->156
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 02655421
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: bad6a7c21071641adfd22c4ea6336acabff3016e270077e843ccac9af47739ff
                                                                    • Instruction ID: 3ceef431aace83337ca3b2e8df87da2c9b027b67ec1a512c081b87ddd4ebe1e3
                                                                    • Opcode Fuzzy Hash: bad6a7c21071641adfd22c4ea6336acabff3016e270077e843ccac9af47739ff
                                                                    • Instruction Fuzzy Hash: BF41B071C0022CCFDB24DFA9C98879EBBB5BF48704F608069D809BB250D7B56946CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 158 2659bd2-2659c18 160 2659c20-2659c4f LoadLibraryExW 158->160 161 2659c1a-2659c1d 158->161 162 2659c51-2659c57 160->162 163 2659c58-2659c75 160->163 161->160 162->163
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02659A31,00000800,00000000,00000000), ref: 02659C42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: a6f77be6481a622acef179ad6adc5c07d6e301d754860604b280a38191e4eae0
                                                                    • Instruction ID: 7a2199c80f897af9a9ebce1c1ada91f05b6cc2ca99159cc282b9dc3fcfb375da
                                                                    • Opcode Fuzzy Hash: a6f77be6481a622acef179ad6adc5c07d6e301d754860604b280a38191e4eae0
                                                                    • Instruction Fuzzy Hash: 2E3147B6D05258DFDB10CF9AD844ADEFBF4AF48720F14846AD859A7600C335654ACFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 166 26593a0-26593b9 168 265938c-2659c18 166->168 169 26593bb-26593d8 166->169 172 2659c20-2659c4f LoadLibraryExW 168->172 173 2659c1a-2659c1d 168->173 174 2659c51-2659c57 172->174 175 2659c58-2659c75 172->175 173->172 174->175
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02659A31,00000800,00000000,00000000), ref: 02659C42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 6367cfd8ef236b237ffc8ed1558ff3bf52ef040f62e7a01a0cbfd08e4e0ae8b3
                                                                    • Instruction ID: 14ce2439f81713eef4df29ef6cdb74bf927601c3ef999defddd30ecca58084ee
                                                                    • Opcode Fuzzy Hash: 6367cfd8ef236b237ffc8ed1558ff3bf52ef040f62e7a01a0cbfd08e4e0ae8b3
                                                                    • Instruction Fuzzy Hash: DF217AB2C05358CFDB11CFA9C884ADEBBF0EF55710F14846AD455A7251C334A946CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 178 2659710-265ba2c DuplicateHandle 180 265ba35-265ba52 178->180 181 265ba2e-265ba34 178->181 181->180
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0265B95E,?,?,?,?,?), ref: 0265BA1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: a541171062e511d3bf0ac8aa0cff6aed438b97166d5e7bfeb2fcc0f0a9098eab
                                                                    • Instruction ID: e3e42c8ee328d17ab9a799f28f81cedc1b2d1886de20ca50899f0812195090f4
                                                                    • Opcode Fuzzy Hash: a541171062e511d3bf0ac8aa0cff6aed438b97166d5e7bfeb2fcc0f0a9098eab
                                                                    • Instruction Fuzzy Hash: 592114B5900208AFDB10CF9AD984AEEFBF4EB48324F14805AE814B7310D378A940CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 184 265b990-265ba2c DuplicateHandle 185 265ba35-265ba52 184->185 186 265ba2e-265ba34 184->186 186->185
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0265B95E,?,?,?,?,?), ref: 0265BA1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: 88216f10b782fb02ce7833b6ed34c83ca6ad2251d4f9f377e8915b3b06937c1b
                                                                    • Instruction ID: fe6cae62df6e25774c722ec63865e9db11f79ff76f29f0cd2d2548d45c7a279b
                                                                    • Opcode Fuzzy Hash: 88216f10b782fb02ce7833b6ed34c83ca6ad2251d4f9f377e8915b3b06937c1b
                                                                    • Instruction Fuzzy Hash: 342114B5D002099FCB00CFA9D584AEEFBF5FB08310F14806AE814A3310C378A940CF64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 189 2659388-2659c18 191 2659c20-2659c4f LoadLibraryExW 189->191 192 2659c1a-2659c1d 189->192 193 2659c51-2659c57 191->193 194 2659c58-2659c75 191->194 192->191 193->194
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02659A31,00000800,00000000,00000000), ref: 02659C42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 97e1a3b7b119251570fc0f82f83db991a9d5ef007cd33ed465fb99db394fdcde
                                                                    • Instruction ID: 0de6c26b6174993918b0ced51247f34eb9b53ac46059263fd1d2ec702a5380bf
                                                                    • Opcode Fuzzy Hash: 97e1a3b7b119251570fc0f82f83db991a9d5ef007cd33ed465fb99db394fdcde
                                                                    • Instruction Fuzzy Hash: B21103B2900259DFDB10CF9AD544ADEFBF4AB88714F14846AD819A7700C378A545CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 197 2659950-2659990 198 2659992-2659995 197->198 199 2659998-26599c3 GetModuleHandleW 197->199 198->199 200 26599c5-26599cb 199->200 201 26599cc-26599e0 199->201 200->201
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 026599B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 30a6677b16bc10cd73b7f9d348e4d84257c2fa857a38148d9923911077ddf3aa
                                                                    • Instruction ID: a4d32d0fea0ec758ace388a9178c802ec02bc7e94de2834ba22f962aa3f7cdeb
                                                                    • Opcode Fuzzy Hash: 30a6677b16bc10cd73b7f9d348e4d84257c2fa857a38148d9923911077ddf3aa
                                                                    • Instruction Fuzzy Hash: 5011EDB6D002598FCB10CF9AC944ADEFBF4AF88724F14846AD869B7700D378A545CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 203 7e282c8-7e28332 PostMessageW 204 7e28334-7e2833a 203->204 205 7e2833b-7e2834f 203->205 204->205
                                                                    APIs
                                                                    • PostMessageW.USER32(?,?,?,?), ref: 07E28325
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.391152313.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7e20000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: 6bd261fd45c112b2fa61e9bb42ccfbac0dea7f5a83e52231d5d17097c4014482
                                                                    • Instruction ID: 42b8eeb264937e2c1a82de183d1527a207bf5fa68536496c80d5f5ff30852b60
                                                                    • Opcode Fuzzy Hash: 6bd261fd45c112b2fa61e9bb42ccfbac0dea7f5a83e52231d5d17097c4014482
                                                                    • Instruction Fuzzy Hash: 8A11E5B58003599FDB10CF9AD584BDEFBF8FB48724F148459D455A7600C374A984CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349333459.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_ccd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0d42eaab5de55818991fc3bef1f1f775f1f5af386f494b0a6b6536902e42f6bc
                                                                    • Instruction ID: 4ddf2f6302b33f7ebeb886d08aed2d2d7c08d8dad8093bf9603816569340677d
                                                                    • Opcode Fuzzy Hash: 0d42eaab5de55818991fc3bef1f1f775f1f5af386f494b0a6b6536902e42f6bc
                                                                    • Instruction Fuzzy Hash: 742125B2504240DFDB05DF14D9C0F26BF65FB88328F24867DE8460B246C336D946DBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349494232.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_cdd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 80853967a5490a32dd5cc3a7ac5c3c86cb5c5c9e2e717215191715b1031ec4d9
                                                                    • Instruction ID: 9491f9d33099ff76d2cfc4daf69062b3fcfb3f7bdc276f80e3d3f260b9309d67
                                                                    • Opcode Fuzzy Hash: 80853967a5490a32dd5cc3a7ac5c3c86cb5c5c9e2e717215191715b1031ec4d9
                                                                    • Instruction Fuzzy Hash: 6021F575904240DFDB15DF14D9C0B16BBA5FBC4314F24C96AD94A4B346C336E847DB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349494232.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_cdd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d45e4c68e24953a3b08c349e963af661eba318b9dae10d2f24cd51d1f7e02114
                                                                    • Instruction ID: fbc4128ba0dd666410537f5686c43acf3c9a2c19b7ecc1b9a7c089ff76b1817f
                                                                    • Opcode Fuzzy Hash: d45e4c68e24953a3b08c349e963af661eba318b9dae10d2f24cd51d1f7e02114
                                                                    • Instruction Fuzzy Hash: F0210471904240EFDB05DF14D9C0B26BBA5FB84324F24CAAEEA4A4B346C336DC46DB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349494232.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_cdd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 27113ac13002c316a22bfec51dc14f427746ddcb65b9abe09e7ba31c5a034b2f
                                                                    • Instruction ID: 83bb366faa0874acd6e768625507802b383792beea4627df2dcb505a4d972965
                                                                    • Opcode Fuzzy Hash: 27113ac13002c316a22bfec51dc14f427746ddcb65b9abe09e7ba31c5a034b2f
                                                                    • Instruction Fuzzy Hash: D9217F755093808FCB12CF24D990715BF71AB86314F29C5EBD8498B697C33A980ACB62
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349333459.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_ccd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                                                    • Instruction ID: e54f360d999098b61b6f9ccc190e6533af17547c25034192a9c9a0ad84f89ec8
                                                                    • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                                                    • Instruction Fuzzy Hash: AF11B1B6504280CFCB16CF14D9C4B16BF71FB84324F24C6ADD8450B656C336D956CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349494232.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_cdd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                                                                    • Instruction ID: 55ab4bd760234a58e1b5f9426bc8fc256dc409ac8502819fe1ec7b47db340d16
                                                                    • Opcode Fuzzy Hash: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                                                                    • Instruction Fuzzy Hash: CD11A975904280DFCB02CF10C5C0B15FBA1FB84324F28C6AAD94A4B756C33AD84ACB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349333459.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_ccd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a85e0d090015f8473ffd4fb84ee21f63d12e8fe68873ad1e1dc7d0bb627bdfb3
                                                                    • Instruction ID: 60af665b8fbf1fc46fd64257f9560c06e62157b39e28d175efe027bdfcedd17d
                                                                    • Opcode Fuzzy Hash: a85e0d090015f8473ffd4fb84ee21f63d12e8fe68873ad1e1dc7d0bb627bdfb3
                                                                    • Instruction Fuzzy Hash: BA01F731508380AAE7104F16CC84F66BF98EF41734F18856EED1A5F64AC3789841D7B1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.349333459.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_ccd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cfdb038b4dddf73211e2439c28d921e1b9f840fd6924de51c5495d061a762e9b
                                                                    • Instruction ID: 5ce28b9b2e767a17017f18e382a647dc070f3bcaed553a6b55e3ea8c4107d832
                                                                    • Opcode Fuzzy Hash: cfdb038b4dddf73211e2439c28d921e1b9f840fd6924de51c5495d061a762e9b
                                                                    • Instruction Fuzzy Hash: 33F04F72504284AAE7118E16CC88B62FB98EB91734F18C56EED195B686C2799844CBB1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.391152313.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7e20000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: UUUU$a
                                                                    • API String ID: 0-1082907647
                                                                    • Opcode ID: 216ee0f595bb7b6a00d147c96255984078fbc6c236290815f3434498f456bb33
                                                                    • Instruction ID: 7527cdbb96ee6c13c6f650378cfa9b41fd9483f3fc4d41202e1381b9ff72a2c2
                                                                    • Opcode Fuzzy Hash: 216ee0f595bb7b6a00d147c96255984078fbc6c236290815f3434498f456bb33
                                                                    • Instruction Fuzzy Hash: 4E516F70E11628CFEB64CFA8C981B8DBBF1BF88314F1486A9D158E7205D7749A96CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 49f8a2f01736dced9db3744301a89a506efc169681136b0db93e4bbea2ba3e4f
                                                                    • Instruction ID: 74c4f33fc7e71ed34f373bd753c1980f57dee405f70677f1cd2c80763cae361a
                                                                    • Opcode Fuzzy Hash: 49f8a2f01736dced9db3744301a89a506efc169681136b0db93e4bbea2ba3e4f
                                                                    • Instruction Fuzzy Hash: E812D8FA512746FAE312CF65E89C3A93B61F745328B504228D2611BAD4DFBC1D4ACF48
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a8982a892bcb2140d984bd38d72c865f4b2f8fd6095c0d5287b27a86b1d893af
                                                                    • Instruction ID: acbd663faa2c37b775fd8d89739797899a0dcfdd672d8507247898376385b290
                                                                    • Opcode Fuzzy Hash: a8982a892bcb2140d984bd38d72c865f4b2f8fd6095c0d5287b27a86b1d893af
                                                                    • Instruction Fuzzy Hash: B0A14D32E0062A9FCF05DFA5C88499EB7B2FF85304F15856AE805BB261EB35AD45CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.350206965.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2650000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 24f56d4214cb5237878e23900763880f26ce7c87f2ff95fcf2a30e3f83d0b63d
                                                                    • Instruction ID: 6039f1da4149a4a52ea8408755825c97eced426f388ecb5b599c33c07d8ff958
                                                                    • Opcode Fuzzy Hash: 24f56d4214cb5237878e23900763880f26ce7c87f2ff95fcf2a30e3f83d0b63d
                                                                    • Instruction Fuzzy Hash: 42C13ABA912746FAE712DF24E89C3993B61FB85324F514228D1612B6D0DFBC1D4ACF48
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.391152313.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7e20000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d6caa39337a9b3099c5bbad0f08059c89e22a300cd96fd536492c97dd00f426e
                                                                    • Instruction ID: f07959f07ca74ccb1c9c2bf7d685dc0e16bcbb8a1620774298802673191eb48c
                                                                    • Opcode Fuzzy Hash: d6caa39337a9b3099c5bbad0f08059c89e22a300cd96fd536492c97dd00f426e
                                                                    • Instruction Fuzzy Hash: BB415C71E056548FE719CF6B8D4068AFFF3AFC9201F18C1FAC448AA265EB3409468F11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.391152313.0000000007E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E20000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7e20000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b2c7bb7aa51aad661f558c36d962c85314a2756a9568f2c43f885a057e415a79
                                                                    • Instruction ID: 34dd0c5b7b5416e029ce967ff0802ab7c661847bb5151363e08abfe581db37c9
                                                                    • Opcode Fuzzy Hash: b2c7bb7aa51aad661f558c36d962c85314a2756a9568f2c43f885a057e415a79
                                                                    • Instruction Fuzzy Hash: B54121B1E05A18CFEB58CF6B8D4079AFAF7AFC9201F14D1BA840CA6255EB3415868F11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:10.9%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:138
                                                                    Total number of Limit Nodes:7
                                                                    execution_graph 18282 7892c88 18283 7892c8c 18282->18283 18284 7892cb0 18283->18284 18287 7892cdb 18283->18287 18293 7892cf0 18283->18293 18288 7892cf0 18287->18288 18290 7892d1d 18288->18290 18299 7892e68 FindCloseChangeNotification 18288->18299 18301 7892e60 18288->18301 18289 7892d19 18289->18284 18290->18284 18294 7892cf4 18293->18294 18296 7892d1d 18294->18296 18297 7892e68 FindCloseChangeNotification 18294->18297 18298 7892e60 FindCloseChangeNotification 18294->18298 18295 7892d19 18295->18284 18296->18284 18297->18295 18298->18295 18300 7892ecf 18299->18300 18300->18289 18302 7892e68 FindCloseChangeNotification 18301->18302 18303 7892ecf 18302->18303 18303->18289 18304 7891ac8 18305 7891c53 18304->18305 18306 7891aee 18304->18306 18306->18305 18309 7891d48 PostMessageW 18306->18309 18311 7891d40 PostMessageW 18306->18311 18310 7891db4 18309->18310 18310->18306 18312 7891db4 18311->18312 18312->18306 18313 28640d0 18314 28640e2 18313->18314 18315 28640ee 18314->18315 18319 28641e0 18314->18319 18324 2863c64 18315->18324 18317 286410d 18320 2864205 18319->18320 18328 28642d0 18320->18328 18332 28642e0 18320->18332 18325 2863c6f 18324->18325 18340 28651a4 18325->18340 18327 2866ae5 18327->18317 18329 28642e0 18328->18329 18331 28643e4 18329->18331 18336 2863de4 18329->18336 18333 28642e4 18332->18333 18334 28643e4 18333->18334 18335 2863de4 CreateActCtxA 18333->18335 18335->18334 18337 2865370 CreateActCtxA 18336->18337 18339 2865433 18337->18339 18341 28651af 18340->18341 18344 2865808 18341->18344 18343 2866b95 18343->18327 18345 2865813 18344->18345 18348 2865838 18345->18348 18347 2866c7a 18347->18343 18349 2865843 18348->18349 18352 2865868 18349->18352 18351 2866d6a 18351->18347 18353 2865873 18352->18353 18355 2867229 18353->18355 18359 28674cb 18353->18359 18354 28674bc 18354->18351 18355->18354 18364 286b390 18355->18364 18369 286b3a0 18355->18369 18360 28674ae 18359->18360 18361 28674bc 18360->18361 18362 286b390 5 API calls 18360->18362 18363 286b3a0 5 API calls 18360->18363 18361->18355 18362->18361 18363->18361 18366 286b3a0 18364->18366 18365 286b3e5 18365->18354 18366->18365 18374 286b658 18366->18374 18378 286b647 18366->18378 18370 286b3a4 18369->18370 18371 286b3e5 18370->18371 18372 286b647 5 API calls 18370->18372 18373 286b658 5 API calls 18370->18373 18371->18354 18372->18371 18373->18371 18375 286b65c 18374->18375 18377 286b69f 18375->18377 18382 2869688 18375->18382 18377->18365 18379 286b658 18378->18379 18380 286b69f 18379->18380 18381 2869688 5 API calls 18379->18381 18380->18365 18381->18380 18383 2869693 18382->18383 18385 286c398 18383->18385 18386 286bf58 18383->18386 18385->18385 18387 286bf63 18386->18387 18388 2865868 5 API calls 18387->18388 18389 286c407 18388->18389 18393 286e178 18389->18393 18401 286e190 18389->18401 18390 286c440 18390->18385 18394 286e190 18393->18394 18396 286e1cd 18394->18396 18397 286e610 LoadLibraryExW GetModuleHandleW 18394->18397 18398 286e601 LoadLibraryExW GetModuleHandleW 18394->18398 18395 286e20d 18399 286efc8 CreateWindowExW CreateWindowExW CreateWindowExW 18395->18399 18400 286efd8 CreateWindowExW CreateWindowExW CreateWindowExW 18395->18400 18396->18390 18397->18395 18398->18395 18399->18396 18400->18396 18403 286e1c1 18401->18403 18405 286e2b2 18401->18405 18402 286e1cd 18402->18390 18403->18402 18406 286e610 LoadLibraryExW GetModuleHandleW 18403->18406 18407 286e601 LoadLibraryExW GetModuleHandleW 18403->18407 18404 286e20d 18408 286efc8 CreateWindowExW CreateWindowExW CreateWindowExW 18404->18408 18409 286efd8 CreateWindowExW CreateWindowExW CreateWindowExW 18404->18409 18405->18390 18406->18404 18407->18404 18408->18405 18409->18405 18410 286b770 18411 286b774 18410->18411 18415 286b923 18411->18415 18418 286b930 18411->18418 18412 286b885 18421 2869710 18415->18421 18419 286b95e 18418->18419 18420 2869710 DuplicateHandle 18418->18420 18419->18412 18420->18419 18422 286b998 DuplicateHandle 18421->18422 18424 286b95e 18422->18424 18424->18412 18425 2869270 18429 2869770 18425->18429 18437 2869761 18425->18437 18426 286927f 18430 2869783 18429->18430 18431 286979b 18430->18431 18445 28699f8 18430->18445 18449 28699e9 18430->18449 18431->18426 18432 2869793 18432->18431 18433 2869998 GetModuleHandleW 18432->18433 18434 28699c5 18433->18434 18434->18426 18438 2869783 18437->18438 18439 286979b 18438->18439 18443 28699f8 LoadLibraryExW 18438->18443 18444 28699e9 LoadLibraryExW 18438->18444 18439->18426 18440 2869793 18440->18439 18441 2869998 GetModuleHandleW 18440->18441 18442 28699c5 18441->18442 18442->18426 18443->18440 18444->18440 18446 28699fc 18445->18446 18448 2869a31 18446->18448 18453 2869388 18446->18453 18448->18432 18450 28699f8 18449->18450 18451 2869388 LoadLibraryExW 18450->18451 18452 2869a31 18450->18452 18451->18452 18452->18432 18454 2869bd8 LoadLibraryExW 18453->18454 18456 2869c51 18454->18456 18456->18448

                                                                    Control-flow Graph

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: eb85353c48ef7c1e1822641dd7dd992881c193d702cd11a753056b43a2d04c38
                                                                    • Instruction ID: a9530b7fc3020073cb90cf79671647a1faddc10d1a23a94d90c4d2b6fe4de87c
                                                                    • Opcode Fuzzy Hash: eb85353c48ef7c1e1822641dd7dd992881c193d702cd11a753056b43a2d04c38
                                                                    • Instruction Fuzzy Hash: 40919AB9C08388DFCB12CFA5D8909DDBFB1FF4A300F15819AE409AB262D3359956CB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 28 2869770-2869778 29 2869783-2869785 28->29 30 286977e call 28682ec 28->30 31 2869787 29->31 32 286979b-286979f 29->32 30->29 83 286978d call 28699f8 31->83 84 286978d call 28699e9 31->84 33 28697b3-28697f4 32->33 34 28697a1-28697ab 32->34 39 28697f6-28697fe 33->39 40 2869801-286980f 33->40 34->33 35 2869793-2869795 35->32 38 28698d0-286994e 35->38 76 2869954-2869990 38->76 77 2869950-2869953 38->77 39->40 42 2869833-2869835 40->42 43 2869811-2869816 40->43 46 2869838-286983f 42->46 44 2869821 43->44 45 2869818-286981f call 28682f8 43->45 49 2869823-2869831 44->49 45->49 50 2869841-2869849 46->50 51 286984c-2869853 46->51 49->46 50->51 52 2869855-286985d 51->52 53 2869860-2869869 call 2868308 51->53 52->53 58 2869876-286987b 53->58 59 286986b-2869873 53->59 61 286987d-2869884 58->61 62 2869899-286989d 58->62 59->58 61->62 63 2869886-2869896 call 2868318 call 286935c 61->63 85 28698a0 call 2869cd0 62->85 86 28698a0 call 2869d00 62->86 63->62 66 28698a3-28698a6 69 28698a8-28698c6 66->69 70 28698c9-28698cf 66->70 69->70 78 2869992-2869995 76->78 79 2869998-28699c3 GetModuleHandleW 76->79 77->76 78->79 80 28699c5-28699cb 79->80 81 28699cc-28699e0 79->81 80->81 83->35 84->35 85->66 86->66
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 028699B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: ea1ffa46faa24fe693bc7b15597e1216c53c8a25fb72fe166a63e4a419833628
                                                                    • Instruction ID: 2f5367eab02cfa5e68aa991cc643a763f913bcfe2aad1fc516fcca0421ce6978
                                                                    • Opcode Fuzzy Hash: ea1ffa46faa24fe693bc7b15597e1216c53c8a25fb72fe166a63e4a419833628
                                                                    • Instruction Fuzzy Hash: E4712478A00B058FD724DF6AD54476ABBF1BF88304F10892ED48AD7A90D735E849CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 87 286dd28-286fe3e 90 286fe40-286fe46 87->90 91 286fe49-286fe50 87->91 90->91 92 286fe52-286fe58 91->92 93 286fe5b-286fe93 91->93 92->93 94 286fe9b-286fefa CreateWindowExW 93->94 95 286ff03-286ff3b 94->95 96 286fefc-286ff02 94->96 100 286ff3d-286ff40 95->100 101 286ff48 95->101 96->95 100->101 102 286ff49 101->102 102->102
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0286FEEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: 451b8917b223f84e5b641fb578eb51a60527fea4af2294d048d703631e8e88b3
                                                                    • Instruction ID: 1250efb79b2685cff0d3763a95ac2270e9568488c630183268d8382434cd25e8
                                                                    • Opcode Fuzzy Hash: 451b8917b223f84e5b641fb578eb51a60527fea4af2294d048d703631e8e88b3
                                                                    • Instruction Fuzzy Hash: 025114B5D04349DFDB10CFA9D884ADEBFB5BF49304F24812AE419AB211D7749845CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 103 286dd44-286fe3e 105 286fe40-286fe46 103->105 106 286fe49-286fe50 103->106 105->106 107 286fe52-286fe58 106->107 108 286fe5b-286fefa CreateWindowExW 106->108 107->108 110 286ff03-286ff3b 108->110 111 286fefc-286ff02 108->111 115 286ff3d-286ff40 110->115 116 286ff48 110->116 111->110 115->116 117 286ff49 116->117 117->117
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0286FEEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: 506c83ff9e33d1ac3de0798d3aa174075a688a5bf67855c44554c99540ec0a9a
                                                                    • Instruction ID: 28627b1b4e3e43b87df72ac941e26c10db70bb37f4bb25f9ae1df054bc9d6c51
                                                                    • Opcode Fuzzy Hash: 506c83ff9e33d1ac3de0798d3aa174075a688a5bf67855c44554c99540ec0a9a
                                                                    • Instruction Fuzzy Hash: FB51E0B5D00309DFDB14CF9AD884ADEBFB5BF48314F24812AE819AB610D771A885CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 118 2863de4-2865431 CreateActCtxA 121 2865433-2865439 118->121 122 286543a-2865494 118->122 121->122 129 2865496-2865499 122->129 130 28654a3-28654a7 122->130 129->130 131 28654b8 130->131 132 28654a9-28654b5 130->132 134 28654b9 131->134 132->131 134->134
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 02865421
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: d36a63c93cca79662c8c1252723973ee6df31cc95da9e799b2fd6503bc34da53
                                                                    • Instruction ID: d0db90581adb31e90bee8eb6a383c63e92213722d20dddac0c0ed8ad745e94c3
                                                                    • Opcode Fuzzy Hash: d36a63c93cca79662c8c1252723973ee6df31cc95da9e799b2fd6503bc34da53
                                                                    • Instruction Fuzzy Hash: 1641F2B4C0021DCFDB24DFA9C94879DBBB5BF49304F5080A9D409BB250D7B56985CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 135 286536f-2865431 CreateActCtxA 137 2865433-2865439 135->137 138 286543a-2865494 135->138 137->138 145 2865496-2865499 138->145 146 28654a3-28654a7 138->146 145->146 147 28654b8 146->147 148 28654a9-28654b5 146->148 150 28654b9 147->150 148->147 150->150
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 02865421
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: bc2450eed782f3dfa335845b7cf495ae3ee2c289ec8df674233797e7cc8d7f11
                                                                    • Instruction ID: d9c5d251acfbbd385a61d655ab499f3e0f23b21deebba82c943fb4f636b6c440
                                                                    • Opcode Fuzzy Hash: bc2450eed782f3dfa335845b7cf495ae3ee2c289ec8df674233797e7cc8d7f11
                                                                    • Instruction Fuzzy Hash: B841B0B5C0021DCEDB24DFA9C98879DBBB5BF49304F6080AAD419BB250D7B56985CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 151 2869707-286b99b 153 286b99c-286ba2c DuplicateHandle 151->153 154 286ba35-286ba52 153->154 155 286ba2e-286ba34 153->155 155->154
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0286B95E,?,?,?,?,?), ref: 0286BA1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: a21fba2e663e1d22fdbfdb0820e735616f4c34017fc73521890db25714a9448f
                                                                    • Instruction ID: 0d90c29f5e9a9d6b78ef302e1b8cd3a340e398a07ac743c456449110dab27d39
                                                                    • Opcode Fuzzy Hash: a21fba2e663e1d22fdbfdb0820e735616f4c34017fc73521890db25714a9448f
                                                                    • Instruction Fuzzy Hash: D12128B59002489FDB00CFAAD988AEEBFF4FB48314F14805AE914F7210D375A954CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 158 2869710-286ba2c DuplicateHandle 161 286ba35-286ba52 158->161 162 286ba2e-286ba34 158->162 162->161
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0286B95E,?,?,?,?,?), ref: 0286BA1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: 08dc81eeb3de4fc3b6171c3eb86ad47c56de3d72b5ec4a69b6cac0c09a81d94e
                                                                    • Instruction ID: fde0228f15366b25b7b92f328f7ad0369ef387f0348a3e659ef120e8bda9b4bb
                                                                    • Opcode Fuzzy Hash: 08dc81eeb3de4fc3b6171c3eb86ad47c56de3d72b5ec4a69b6cac0c09a81d94e
                                                                    • Instruction Fuzzy Hash: B12103B59002489FDB10CF9AD988AEEBBF4EB48324F14801AE919F7310D375A954DFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 165 286b990-286b996 166 286b99c-286ba2c DuplicateHandle 165->166 167 286b998-286b99b 165->167 168 286ba35-286ba52 166->168 169 286ba2e-286ba34 166->169 167->166 169->168
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0286B95E,?,?,?,?,?), ref: 0286BA1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: d8a8f3723f5698e41a2ed90310a5919795df8696b33028b582c96e0fc0e5f1c0
                                                                    • Instruction ID: 0b4b50d650800ec42ed6ff6004423f63cd8c71ab4e04f41290ce676bd996d3b8
                                                                    • Opcode Fuzzy Hash: d8a8f3723f5698e41a2ed90310a5919795df8696b33028b582c96e0fc0e5f1c0
                                                                    • Instruction Fuzzy Hash: D92105B5D002089FCB10CF9AD984AEEBFF4EB48314F14801AE918B7310D375A954DFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 172 2869bd3-2869bd5 173 2869bb7-2869bbe 172->173 174 2869bd7-2869c18 172->174 175 2869c20-2869c4f LoadLibraryExW 174->175 176 2869c1a-2869c1d 174->176 177 2869c51-2869c57 175->177 178 2869c58-2869c75 175->178 176->175 177->178
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02869A31,00000800,00000000,00000000), ref: 02869C42
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 88894ac55e57b0242c76b8f71f2218ff81dfef40d5939fbecaf3c80a706cd0b1
                                                                    • Instruction ID: f9bb060c00adb84d91fdf2a0ea882545f112641fb8fb8afbbd1c753995e87b3e
                                                                    • Opcode Fuzzy Hash: 88894ac55e57b0242c76b8f71f2218ff81dfef40d5939fbecaf3c80a706cd0b1
                                                                    • Instruction Fuzzy Hash: 2F2147BAD00249CFDB10CF9AD488ADEFBF4FB98724F10842AD519A7640C375A549CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 181 2869388-2869c18 183 2869c20-2869c4f LoadLibraryExW 181->183 184 2869c1a-2869c1d 181->184 185 2869c51-2869c57 183->185 186 2869c58-2869c75 183->186 184->183 185->186
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02869A31,00000800,00000000,00000000), ref: 02869C42
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 0c6f152d7e3b36dd3dfb53add6736edd7daf44c7c940c1e3b518d6f4ce899ab3
                                                                    • Instruction ID: eba74e102ec2fcecd05d4703fb54b4c6574a92e9b2b56700d7aa6d2ee4dbc46e
                                                                    • Opcode Fuzzy Hash: 0c6f152d7e3b36dd3dfb53add6736edd7daf44c7c940c1e3b518d6f4ce899ab3
                                                                    • Instruction Fuzzy Hash: 1E1114BAD002499FDB10CF9AC448AEEFBF5EB48714F10842EE419BB640C375A549CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 189 7892e60-7892ecd FindCloseChangeNotification 191 7892ecf-7892ed5 189->191 192 7892ed6-7892efe 189->192 191->192
                                                                    APIs
                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 07892EC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.470556295.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_7890000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseFindNotification
                                                                    • String ID:
                                                                    • API String ID: 2591292051-0
                                                                    • Opcode ID: ba52022b15ae627c3e8d68dac07728aedeaa34c6dbedcaf315ea77d0da3b0d47
                                                                    • Instruction ID: 565752379dbe1c25c54ac051216abfeb6e704c00b99549cdc99e13f57365c910
                                                                    • Opcode Fuzzy Hash: ba52022b15ae627c3e8d68dac07728aedeaa34c6dbedcaf315ea77d0da3b0d47
                                                                    • Instruction Fuzzy Hash: E21128B18002499FCB10CF9AC584BDEBFF4FB48320F14846AD859A7641D378A684CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 202 7892e68-7892ecd FindCloseChangeNotification 203 7892ecf-7892ed5 202->203 204 7892ed6-7892efe 202->204 203->204
                                                                    APIs
                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 07892EC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.470556295.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_7890000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseFindNotification
                                                                    • String ID:
                                                                    • API String ID: 2591292051-0
                                                                    • Opcode ID: 3728145a1330e588b0427e9891ad10f98ae10e4da4502e452d4a55f81fd35b5f
                                                                    • Instruction ID: 41f1b4b706cf8e395bd36feff1f9184447a33d857a14a706c43311f476a62d51
                                                                    • Opcode Fuzzy Hash: 3728145a1330e588b0427e9891ad10f98ae10e4da4502e452d4a55f81fd35b5f
                                                                    • Instruction Fuzzy Hash: 251103B19002499FCB10CF9AC584BDEBBF4FB48320F14842AD959A7640D778A688CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 195 2869950-2869990 197 2869992-2869995 195->197 198 2869998-28699c3 GetModuleHandleW 195->198 197->198 199 28699c5-28699cb 198->199 200 28699cc-28699e0 198->200 199->200
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 028699B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.447564215.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_2860000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 6b4dd8d2b78f167a756fafa961ece0d8c955780a41a54631daea0667a24e5dec
                                                                    • Instruction ID: eddbb609630a93f1685aca83dc57cf59907ec44ddf42c8e2442cdecc658bc38f
                                                                    • Opcode Fuzzy Hash: 6b4dd8d2b78f167a756fafa961ece0d8c955780a41a54631daea0667a24e5dec
                                                                    • Instruction Fuzzy Hash: AC1102B5C002498FCB10CF9AC448BDEFBF4AB89224F14842AD459B7600C375A545CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 207 7891d40-7891db2 PostMessageW 208 7891dbb-7891dcf 207->208 209 7891db4-7891dba 207->209 209->208
                                                                    APIs
                                                                    • PostMessageW.USER32(?,?,?,?), ref: 07891DA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.470556295.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_7890000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: 8394f92da28365b68a83bef55cf96c655aa75a6fa66edb4c5562389e91200308
                                                                    • Instruction ID: 65f46d5aa44c00fd9d4fb1e5d984c56bb8af76b71cdd297aa6d518076dc907b8
                                                                    • Opcode Fuzzy Hash: 8394f92da28365b68a83bef55cf96c655aa75a6fa66edb4c5562389e91200308
                                                                    • Instruction Fuzzy Hash: FD1110B6C003499FCB10CF99C588BDEBBF8BB48320F14881AE455A7600C375A684CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PostMessageW.USER32(?,?,?,?), ref: 07891DA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.470556295.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_7890000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: 8e78ca83c3138d0518671386dab101f01780baaa7b9ba5ae6b5e6c81164ba40a
                                                                    • Instruction ID: a91f38ee38ffd8f24da7bac8ab123ec57b3d6636674ecb368d4903ba3a77d956
                                                                    • Opcode Fuzzy Hash: 8e78ca83c3138d0518671386dab101f01780baaa7b9ba5ae6b5e6c81164ba40a
                                                                    • Instruction Fuzzy Hash: DF11E5B5C003499FDB10CF9AC988BDEBFF8EB49324F14841AE955A7600C375A584CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 403dfbe8edd7e6dce368254e79b6912d4f5302ea233da9ee1bcf5d87eca74548
                                                                    • Instruction ID: 78e193f6cf46821e57f59addc0aa4d6935a171d378b6cbbc1354eee766d33b04
                                                                    • Opcode Fuzzy Hash: 403dfbe8edd7e6dce368254e79b6912d4f5302ea233da9ee1bcf5d87eca74548
                                                                    • Instruction Fuzzy Hash: 1131B475E012189FDB14DFA9D854AEEBBB2FF88300F14802AD515B7350EB355A42DFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445013680.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_ecd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0384382a5c328823d7e3703bbd859d9e7b4e732d1dd30ca7e51fdc3f8727ff01
                                                                    • Instruction ID: 649c4fbc997de71116e8b05cd056ff9b863557b16cbef4f82f19258177d0ade3
                                                                    • Opcode Fuzzy Hash: 0384382a5c328823d7e3703bbd859d9e7b4e732d1dd30ca7e51fdc3f8727ff01
                                                                    • Instruction Fuzzy Hash: 122124B1508240DFDB09DF04DAC0F1ABB65FB94324F20867DD9095B206C337E857D6A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445142308.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_edd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9fc4bcfbbb996ec74b251d09e7083b14e289c8d72b85057e2621016468671e21
                                                                    • Instruction ID: 75051d898f41f1cecb993ed4aa82e3a667347e01ada4c9e8d5e5177a505aaa51
                                                                    • Opcode Fuzzy Hash: 9fc4bcfbbb996ec74b251d09e7083b14e289c8d72b85057e2621016468671e21
                                                                    • Instruction Fuzzy Hash: 8B21F275608240DFDB15DF24D9C0B16BBA6FBC8328F24CA6AD84A5B346C336D847DA61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445142308.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_edd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c28f13770436d5d00eab0da092d417879ca369ab57c785f15ebba35177e5b4f8
                                                                    • Instruction ID: 7721cb94cb6943baeb729902031c4c2e5f15467f62f9116a917cc52b3eff6480
                                                                    • Opcode Fuzzy Hash: c28f13770436d5d00eab0da092d417879ca369ab57c785f15ebba35177e5b4f8
                                                                    • Instruction Fuzzy Hash: 0321F271508240EFDB05DF54D9C0B26BBA5FB84328F24CA6AE8496B366C336D847DA61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445142308.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_edd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8c0468dd87458ccb402b8e5b9cab3f95bfdd48c5c85264768a207b3e93da8afa
                                                                    • Instruction ID: 940da08c4c90fdcd5df2b899337235acb1147ac2de9bc3f6af4b944afa0afe86
                                                                    • Opcode Fuzzy Hash: 8c0468dd87458ccb402b8e5b9cab3f95bfdd48c5c85264768a207b3e93da8afa
                                                                    • Instruction Fuzzy Hash: 4A21717550D3808FD712CF24D990715BF71EB86314F29C5EBD8458B657C33A984ACB62
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445013680.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_ecd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                                                    • Instruction ID: 959393b3eb6ee2e4f200dff1d7a45ebd14a8f961575d6e0307b4be9ef89d868a
                                                                    • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                                                    • Instruction Fuzzy Hash: 1B11DF72404280DFCB16CF00DAC0B16BF71FB94324F2486ADD9095B616C33BE856CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445142308.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_edd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                                                                    • Instruction ID: 59cbf1b1fdee9fa7c7813839f7c674cc964e73132a7d7a89f923488196393b3f
                                                                    • Opcode Fuzzy Hash: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                                                                    • Instruction Fuzzy Hash: 5B11BE75508280DFCB01CF10C9C0B15BBB1FB84328F24C6AED8495B766C33AD85ACB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445013680.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_ecd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6b9a63b039aebc17b8159c7a7ff42e765eca1959e208154a445e1576e61aad4d
                                                                    • Instruction ID: 2a46cf0c50dace98c341cd16d1059bdea92573950a708ca1495bcacd0f47c59e
                                                                    • Opcode Fuzzy Hash: 6b9a63b039aebc17b8159c7a7ff42e765eca1959e208154a445e1576e61aad4d
                                                                    • Instruction Fuzzy Hash: 6601F73150C380AAE7104E15CE84FA6BF98EF41734F18956FED052F642C37B9846D6B1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.445013680.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_ecd000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f115aeecb4d69613edb7c65bfcb9f7bd941ff481501628d18443edb01a30941a
                                                                    • Instruction ID: 65b9b440051b9f0545283ec3cd96e59c3a046aa8bf23f19a17755dc49bd566ed
                                                                    • Opcode Fuzzy Hash: f115aeecb4d69613edb7c65bfcb9f7bd941ff481501628d18443edb01a30941a
                                                                    • Instruction Fuzzy Hash: 1AF068715042849EE7108E15CDC4B62FF98EB91734F18D55FED085F646C3769845CAB1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 29b7ad858d2bcee581a3f42eab429a6de85c97baf0cb3d0e7ebe942dc0cb097e
                                                                    • Instruction ID: 471b09d1526888ceff7a50eee3a5019f61eedeaa360e988bac6e979569cb4453
                                                                    • Opcode Fuzzy Hash: 29b7ad858d2bcee581a3f42eab429a6de85c97baf0cb3d0e7ebe942dc0cb097e
                                                                    • Instruction Fuzzy Hash: D5E0C238900208EFCB14DFA8D444A9CBBB4FF48300F1080A9E90567320D631AA55DF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2b26b7c8be73823c8ab562f53217c8f36a429bfc6a7f6544bfe43599868ffd87
                                                                    • Instruction ID: ab40ee53358648ad0ffe02cfc2187a5a609d3a7d524337d141d1618de0bcc972
                                                                    • Opcode Fuzzy Hash: 2b26b7c8be73823c8ab562f53217c8f36a429bfc6a7f6544bfe43599868ffd87
                                                                    • Instruction Fuzzy Hash: 78E01270D10208EFCB64DFA9D40069DBBF4FB48300F1080AAD808A7300EB35AA91EF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3e8733604ee7d068fa2174a3f64a4d147d97d58580f47131308936b22f25fb9c
                                                                    • Instruction ID: 50e9aae599772c63e7d6b1d1a7aaa7d40d2f1cf61c46ce296fe6955e663a4c9c
                                                                    • Opcode Fuzzy Hash: 3e8733604ee7d068fa2174a3f64a4d147d97d58580f47131308936b22f25fb9c
                                                                    • Instruction Fuzzy Hash: F8E0B674D15208EFDB64DFA9E44569DBFF4FB48300F1081A9D919A3340EA746A46DF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a612ccdafe4d3a47b1e1a7d99c6764b490ce51d4a90028a55e9126442cfd3b69
                                                                    • Instruction ID: cd33eaebec70fd62c59f195cd6fc8282610ffc338e96d8741ef9499575d285bb
                                                                    • Opcode Fuzzy Hash: a612ccdafe4d3a47b1e1a7d99c6764b490ce51d4a90028a55e9126442cfd3b69
                                                                    • Instruction Fuzzy Hash: 26E01230E05208EFDB64EFA8D40529DBBB4AB48300F2080AAC808A7300EB755A42CF80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 19ab000a1ed73017268e890f0de739704c6a643afe57f73c1eb8e718a8f3204a
                                                                    • Instruction ID: 2ebb9059e3fd3acde4b3f3b3b2bf7205e5fe87992c05e337080397e74062e082
                                                                    • Opcode Fuzzy Hash: 19ab000a1ed73017268e890f0de739704c6a643afe57f73c1eb8e718a8f3204a
                                                                    • Instruction Fuzzy Hash: B2E04F34910208EFCB14DFA8D84499CBFB4FF09311F108098E90517320C731AE55DF80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000007.00000002.469632998.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_7_2_53b0000_GzGmImHFmOq.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fbd45222d3fc36ea8cf6d483b5bfc67685bb4c393ea806042363b4e8aec80d7e
                                                                    • Instruction ID: f053aa4a89d9d2754782f2a8bca46a145ab62a413b66faca93fe4e3cb3171b16
                                                                    • Opcode Fuzzy Hash: fbd45222d3fc36ea8cf6d483b5bfc67685bb4c393ea806042363b4e8aec80d7e
                                                                    • Instruction Fuzzy Hash: 0DE0EC30D212089FCB50DFB8D84969DBFB8BB04201F5040A9D90993240EA705A45CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:12.5%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:193
                                                                    Total number of Limit Nodes:7
                                                                    execution_graph 19053 6c114a0 19055 6c114a1 19053->19055 19054 6c114ad 19055->19054 19059 6c116b8 19055->19059 19064 6c1169e 19055->19064 19060 6c116b9 19059->19060 19069 2eeedef 19060->19069 19075 2eeee00 19060->19075 19065 6c116ac 19064->19065 19067 2eeedef 3 API calls 19065->19067 19068 2eeee00 3 API calls 19065->19068 19066 6c114d1 19067->19066 19068->19066 19070 2eeee00 19069->19070 19071 2eeeed1 19070->19071 19081 2eefba8 19070->19081 19084 2eefb20 19070->19084 19093 2eefb98 19070->19093 19076 2eeee2a 19075->19076 19077 2eeeed1 19076->19077 19078 2eefba8 CreateWindowExW 19076->19078 19079 2eefb98 2 API calls 19076->19079 19080 2eefb20 2 API calls 19076->19080 19078->19077 19079->19077 19080->19077 19100 2eeda04 19081->19100 19085 2eefbc4 19084->19085 19090 2eefb62 19084->19090 19087 2eefbd8 19085->19087 19085->19090 19086 2eefb8a 19086->19071 19088 2eefbdd 19087->19088 19089 2eeda04 CreateWindowExW 19087->19089 19088->19071 19089->19088 19090->19086 19091 2eefcbb CreateWindowExW 19090->19091 19092 2eefd1c 19091->19092 19094 2eefbae 19093->19094 19097 2eefbe6 CreateWindowExW 19093->19097 19095 2eefbdd 19094->19095 19096 2eeda04 CreateWindowExW 19094->19096 19095->19071 19096->19095 19099 2eefd1c 19097->19099 19099->19099 19101 2eefbf8 CreateWindowExW 19100->19101 19103 2eefd1c 19101->19103 19141 2ee6758 19144 2ee6344 19141->19144 19143 2ee6766 19145 2ee634f 19144->19145 19148 2ee6394 19145->19148 19147 2ee688d 19147->19143 19149 2ee639f 19148->19149 19152 2ee63c4 19149->19152 19151 2ee6962 19151->19147 19153 2ee63cf 19152->19153 19156 2ee63f4 19153->19156 19155 2ee6a62 19155->19151 19157 2ee63ff 19156->19157 19159 2ee717e 19157->19159 19163 2ee92b9 19157->19163 19158 2ee71bc 19158->19155 19159->19158 19167 2eeb408 19159->19167 19172 2eeb3f9 19159->19172 19177 2ee92f0 19163->19177 19181 2ee92e1 19163->19181 19164 2ee92ce 19164->19159 19168 2eeb429 19167->19168 19171 2eeb44d 19168->19171 19213 2eeb5aa 19168->19213 19217 2eeb5b8 19168->19217 19171->19158 19174 2eeb429 19172->19174 19173 2eeb44d 19173->19158 19174->19173 19175 2eeb5aa 8 API calls 19174->19175 19176 2eeb5b8 8 API calls 19174->19176 19175->19173 19176->19173 19178 2ee92ff 19177->19178 19185 2ee93e8 19177->19185 19193 2ee93d9 19177->19193 19178->19164 19183 2ee93e8 2 API calls 19181->19183 19184 2ee93d9 2 API calls 19181->19184 19182 2ee92ff 19182->19164 19183->19182 19184->19182 19186 2ee93fb 19185->19186 19187 2ee9413 19186->19187 19201 2ee9660 19186->19201 19205 2ee9670 19186->19205 19187->19178 19188 2ee940b 19188->19187 19189 2ee9610 GetModuleHandleW 19188->19189 19190 2ee963d 19189->19190 19190->19178 19194 2ee93fb 19193->19194 19196 2ee9413 19194->19196 19199 2ee9660 LoadLibraryExW 19194->19199 19200 2ee9670 LoadLibraryExW 19194->19200 19195 2ee940b 19195->19196 19197 2ee9610 GetModuleHandleW 19195->19197 19196->19178 19198 2ee963d 19197->19198 19198->19178 19199->19195 19200->19195 19203 2ee9670 19201->19203 19202 2ee96a9 19202->19188 19203->19202 19209 2ee8768 19203->19209 19206 2ee9684 19205->19206 19207 2ee96a9 19206->19207 19208 2ee8768 LoadLibraryExW 19206->19208 19207->19188 19208->19207 19211 2ee9850 LoadLibraryExW 19209->19211 19212 2ee98c9 19211->19212 19212->19202 19214 2eeb5b2 19213->19214 19215 2eeb5ff 19214->19215 19221 2eea0ec 19214->19221 19215->19171 19218 2eeb5c5 19217->19218 19219 2eea0ec 8 API calls 19218->19219 19220 2eeb5ff 19218->19220 19219->19220 19220->19171 19222 2eea0f7 19221->19222 19224 2eec2f8 19222->19224 19225 2eeb904 19222->19225 19224->19224 19226 2eeb90f 19225->19226 19227 2ee63f4 8 API calls 19226->19227 19228 2eec367 19227->19228 19229 2eec375 19228->19229 19237 2eec3e0 19228->19237 19241 2eec3d1 19228->19241 19245 2eeb914 19229->19245 19231 2eec38f 19250 2eee0f0 19231->19250 19260 2eee0d8 19231->19260 19232 2eec3a0 19232->19224 19238 2eec40e 19237->19238 19239 2eec4da KiUserCallbackDispatcher 19238->19239 19240 2eec4df 19238->19240 19239->19240 19242 2eec40e 19241->19242 19243 2eec4da KiUserCallbackDispatcher 19242->19243 19244 2eec4df 19242->19244 19243->19244 19246 2eeb91f 19245->19246 19249 2eed509 19246->19249 19269 2eebbb4 19246->19269 19248 2eed504 19248->19231 19249->19231 19252 2eee121 19250->19252 19254 2eee213 19250->19254 19251 2eee12d 19251->19232 19252->19251 19253 2eee16e 19252->19253 19259 2ee92b9 3 API calls 19252->19259 19273 2eee428 19252->19273 19277 2eee438 19252->19277 19255 2eeedef 3 API calls 19253->19255 19256 2eeee00 3 API calls 19253->19256 19254->19232 19255->19254 19256->19254 19259->19253 19261 2eee0f0 19260->19261 19262 2eee16e 19261->19262 19263 2eee12d 19261->19263 19264 2eee428 2 API calls 19261->19264 19265 2eee438 2 API calls 19261->19265 19266 2ee92b9 3 API calls 19261->19266 19267 2eeedef 3 API calls 19262->19267 19268 2eeee00 3 API calls 19262->19268 19263->19232 19264->19262 19265->19262 19266->19262 19267->19263 19268->19263 19270 2eebbbf 19269->19270 19271 2eed5c5 19270->19271 19272 2ee92b9 LoadLibraryExW GetModuleHandleW GetModuleHandleW 19270->19272 19271->19248 19272->19271 19274 2eee438 19273->19274 19275 2ee93e8 LoadLibraryExW GetModuleHandleW 19274->19275 19276 2eee441 19275->19276 19276->19253 19278 2ee93e8 LoadLibraryExW GetModuleHandleW 19277->19278 19279 2eee441 19278->19279 19279->19253 19104 6c13208 19105 6c13209 19104->19105 19109 6c13248 19105->19109 19114 6c13258 19105->19114 19106 6c13242 19110 6c1324c 19109->19110 19119 6c13280 19110->19119 19124 6c13290 19110->19124 19111 6c13274 19111->19106 19115 6c13259 19114->19115 19117 6c13280 DnsQuery_A 19115->19117 19118 6c13290 DnsQuery_A 19115->19118 19116 6c13274 19116->19106 19117->19116 19118->19116 19121 6c132ae 19119->19121 19120 6c132d6 19120->19111 19121->19120 19129 6c13389 19121->19129 19133 6c13398 19121->19133 19125 6c132ae 19124->19125 19126 6c132d6 19125->19126 19127 6c13389 DnsQuery_A 19125->19127 19128 6c13398 DnsQuery_A 19125->19128 19126->19111 19127->19125 19128->19125 19130 6c1338c 19129->19130 19137 6c1190c 19130->19137 19134 6c13399 19133->19134 19135 6c1190c DnsQuery_A 19134->19135 19136 6c13402 19135->19136 19136->19121 19138 6c13610 DnsQuery_A 19137->19138 19140 6c1374a 19138->19140 19140->19140 19280 2eeb6d0 19281 2eeb736 19280->19281 19285 2eebc88 19281->19285 19289 2eebc98 19281->19289 19282 2eeb7e5 19286 2eebc98 19285->19286 19292 2eea14c 19286->19292 19290 2eea14c DuplicateHandle 19289->19290 19291 2eebcc6 19290->19291 19291->19282 19293 2eebd00 DuplicateHandle 19292->19293 19294 2eebcc6 19293->19294 19294->19282 19295 2eefe10 19298 2eeda3c 19295->19298 19299 2eefe40 SetWindowLongW 19298->19299 19300 2eefe28 19299->19300

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 6c13558-6c13574 2 6c13576-6c13587 0->2 3 6c1358a-6c135eb 0->3 12 6c135f9-6c13606 3->12 13 6c135c8-6c135f7 3->13 17 6c13608-6c1360a 12->17 18 6c1360d-6c1366f 12->18 20 6c13611-6c1366f 17->20 21 6c1360c 17->21 22 6c13677-6c13683 18->22 20->22 21->18 23 6c13685-6c1368f 22->23 24 6c136bc-6c136ef 22->24 23->24 26 6c13691-6c13693 23->26 33 6c136f7-6c13748 DnsQuery_A 24->33 27 6c13695-6c1369f 26->27 28 6c136b6-6c136b9 26->28 30 6c136a1 27->30 31 6c136a3-6c136b2 27->31 28->24 30->31 31->31 32 6c136b4 31->32 32->28 34 6c13751-6c1379e 33->34 35 6c1374a-6c13750 33->35 40 6c137a0-6c137a4 34->40 41 6c137ae-6c137b2 34->41 35->34 40->41 42 6c137a6 40->42 43 6c137c1-6c137c5 41->43 44 6c137b4-6c137b7 41->44 42->41 45 6c137c7-6c137d3 43->45 46 6c137d6 43->46 44->43 45->46 48 6c137d7 46->48 48->48
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.575417625.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6c10000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5ec866c36c165d14cea2ae8f2afbd0d5d13d90367aa3efdb06f8a31933834036
                                                                    • Instruction ID: c05a9fcc15d49c7934eda4afaed6eb207aa2da2dc49d92f488cbfeab3ae867b4
                                                                    • Opcode Fuzzy Hash: 5ec866c36c165d14cea2ae8f2afbd0d5d13d90367aa3efdb06f8a31933834036
                                                                    • Instruction Fuzzy Hash: 448187B1D0024DCFDB50DFA9C9806DEBBB5FF4A714F20852AD819AB240DB709A85DF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 49 2ee93e8-2ee93fd call 2ee8704 52 2ee93ff 49->52 53 2ee9413-2ee9417 49->53 105 2ee9405 call 2ee9660 52->105 106 2ee9405 call 2ee9670 52->106 54 2ee942b-2ee946c 53->54 55 2ee9419-2ee9423 53->55 60 2ee946e-2ee9476 54->60 61 2ee9479-2ee9487 54->61 55->54 56 2ee940b-2ee940d 56->53 57 2ee9548-2ee9608 56->57 98 2ee960a-2ee960d 57->98 99 2ee9610-2ee963b GetModuleHandleW 57->99 60->61 62 2ee94ab-2ee94ad 61->62 63 2ee9489-2ee948e 61->63 67 2ee94b0-2ee94b7 62->67 65 2ee9499 63->65 66 2ee9490-2ee9497 call 2ee8710 63->66 70 2ee949b-2ee94a9 65->70 66->70 71 2ee94b9-2ee94c1 67->71 72 2ee94c4-2ee94cb 67->72 70->67 71->72 74 2ee94cd-2ee94d5 72->74 75 2ee94d8-2ee94e1 call 2ee8720 72->75 74->75 80 2ee94ee-2ee94f3 75->80 81 2ee94e3-2ee94eb 75->81 82 2ee94f5-2ee94fc 80->82 83 2ee9511-2ee9515 80->83 81->80 82->83 84 2ee94fe-2ee950e call 2ee8730 call 2ee8740 82->84 103 2ee9518 call 2ee9968 83->103 104 2ee9518 call 2ee9958 83->104 84->83 87 2ee951b-2ee951e 90 2ee9520-2ee953e 87->90 91 2ee9541-2ee9547 87->91 90->91 98->99 100 2ee963d-2ee9643 99->100 101 2ee9644-2ee9658 99->101 100->101 103->87 104->87 105->56 106->56
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 02EE962E
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 6222bff6ba38974225988d64148ca98e045bbc101577335e3efdf86c6432f631
                                                                    • Instruction ID: 581cf48222de302051aff197c78137904eb287ec60210ef7766cdf78a2774442
                                                                    • Opcode Fuzzy Hash: 6222bff6ba38974225988d64148ca98e045bbc101577335e3efdf86c6432f631
                                                                    • Instruction Fuzzy Hash: 94711670A00B058FDB64DF2AC48579ABBF1FF88314F00892EE48AD7A51DB75E8458B91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 107 2eefb20-2eefb60 108 2eefbc4-2eefbd6 107->108 109 2eefb62-2eefb88 107->109 112 2eefbd8 108->112 113 2eefbe0 108->113 110 2eefbec-2eefc5e 109->110 111 2eefb8a-2eefb93 109->111 117 2eefc69-2eefc70 110->117 118 2eefc60-2eefc66 110->118 115 2eefbdd-2eefbde 112->115 116 2eefbd8 call 2eeda04 112->116 113->110 116->115 119 2eefc7b-2eefd1a CreateWindowExW 117->119 120 2eefc72-2eefc78 117->120 118->117 122 2eefd1c-2eefd22 119->122 123 2eefd23-2eefd5b 119->123 120->119 122->123 127 2eefd5d-2eefd60 123->127 128 2eefd68 123->128 127->128 129 2eefd69 128->129 129->129
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EEFD0A
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: aaa68ff642c6bec51a4b25218e12a96ef279174d768d8fddfa4765d9286095a6
                                                                    • Instruction ID: 40d384362976bd42961572ecdaf7378f582e40b69f3784661ddab34385025f22
                                                                    • Opcode Fuzzy Hash: aaa68ff642c6bec51a4b25218e12a96ef279174d768d8fddfa4765d9286095a6
                                                                    • Instruction Fuzzy Hash: DC6132B2C043899FCB11CFA9C880ACEBFB1FF49314F29816AE415AB252D774A945CF51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 130 2eefb98-2eefbac 131 2eefbae-2eefbd5 130->131 132 2eefbe6-2eefc5e 130->132 133 2eefbdd-2eefbde 131->133 134 2eefbd8 call 2eeda04 131->134 137 2eefc69-2eefc70 132->137 138 2eefc60-2eefc66 132->138 134->133 139 2eefc7b-2eefd1a CreateWindowExW 137->139 140 2eefc72-2eefc78 137->140 138->137 142 2eefd1c-2eefd22 139->142 143 2eefd23-2eefd5b 139->143 140->139 142->143 147 2eefd5d-2eefd60 143->147 148 2eefd68 143->148 147->148 149 2eefd69 148->149 149->149
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EEFD0A
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: bda36135535273e17ac5c2089f9c85ab26069aeb4a0aba3761815f7bbeeebfb0
                                                                    • Instruction ID: 414247fd00dd10fe56dafe0b37c195be66578da077dbfd9d401ff2b18785ccd5
                                                                    • Opcode Fuzzy Hash: bda36135535273e17ac5c2089f9c85ab26069aeb4a0aba3761815f7bbeeebfb0
                                                                    • Instruction Fuzzy Hash: E15101B1C00249AFDF01CFA9C980ACEBFB5FF49314F25816AE909AB220D7719995CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 150 6c13604-6c13606 151 6c13608-6c1360a 150->151 152 6c1360d-6c1366f 150->152 153 6c13611-6c1366f 151->153 154 6c1360c 151->154 155 6c13677-6c13683 152->155 153->155 154->152 156 6c13685-6c1368f 155->156 157 6c136bc-6c136ef 155->157 156->157 158 6c13691-6c13693 156->158 165 6c136f7-6c13748 DnsQuery_A 157->165 159 6c13695-6c1369f 158->159 160 6c136b6-6c136b9 158->160 162 6c136a1 159->162 163 6c136a3-6c136b2 159->163 160->157 162->163 163->163 164 6c136b4 163->164 164->160 166 6c13751-6c1379e 165->166 167 6c1374a-6c13750 165->167 172 6c137a0-6c137a4 166->172 173 6c137ae-6c137b2 166->173 167->166 172->173 174 6c137a6 172->174 175 6c137c1-6c137c5 173->175 176 6c137b4-6c137b7 173->176 174->173 177 6c137c7-6c137d3 175->177 178 6c137d6 175->178 176->175 177->178 180 6c137d7 178->180 180->180
                                                                    APIs
                                                                    • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06C13738
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.575417625.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6c10000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: Query_
                                                                    • String ID:
                                                                    • API String ID: 428220571-0
                                                                    • Opcode ID: b3e1a9dddf9f97a51087a52728a9a588903b95024aeabcddb33cd1d24eacf1aa
                                                                    • Instruction ID: 08b902ee36cf58486e150a9685bd10f777264d783de4e2230ad4425f7923744a
                                                                    • Opcode Fuzzy Hash: b3e1a9dddf9f97a51087a52728a9a588903b95024aeabcddb33cd1d24eacf1aa
                                                                    • Instruction Fuzzy Hash: 8D5142B1D0069DCFDB50CFA9C9806DDBBB1FF49314F24802AE819AB250DBB49985DF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 181 6c1190c-6c13683 185 6c13685-6c1368f 181->185 186 6c136bc-6c13748 DnsQuery_A 181->186 185->186 187 6c13691-6c13693 185->187 195 6c13751-6c1379e 186->195 196 6c1374a-6c13750 186->196 188 6c13695-6c1369f 187->188 189 6c136b6-6c136b9 187->189 191 6c136a1 188->191 192 6c136a3-6c136b2 188->192 189->186 191->192 192->192 193 6c136b4 192->193 193->189 201 6c137a0-6c137a4 195->201 202 6c137ae-6c137b2 195->202 196->195 201->202 203 6c137a6 201->203 204 6c137c1-6c137c5 202->204 205 6c137b4-6c137b7 202->205 203->202 206 6c137c7-6c137d3 204->206 207 6c137d6 204->207 205->204 206->207 209 6c137d7 207->209 209->209
                                                                    APIs
                                                                    • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06C13738
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.575417625.0000000006C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6c10000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: Query_
                                                                    • String ID:
                                                                    • API String ID: 428220571-0
                                                                    • Opcode ID: 48aebf8da9b5b988f7edb59fdffd2b685b7321e6f9b98fcd68862195c956f6e1
                                                                    • Instruction ID: 3247af73ccc32081b7a91380bd37a3a7ee317260516afc8108e79eeb508e6276
                                                                    • Opcode Fuzzy Hash: 48aebf8da9b5b988f7edb59fdffd2b685b7321e6f9b98fcd68862195c956f6e1
                                                                    • Instruction Fuzzy Hash: EB5135B1D0065DCFCB50CFA9C9806DDBBB1FF49314F24802AE809AB250DBB49985DF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 210 2eeda04-2eefc5e 212 2eefc69-2eefc70 210->212 213 2eefc60-2eefc66 210->213 214 2eefc7b-2eefd1a CreateWindowExW 212->214 215 2eefc72-2eefc78 212->215 213->212 217 2eefd1c-2eefd22 214->217 218 2eefd23-2eefd5b 214->218 215->214 217->218 222 2eefd5d-2eefd60 218->222 223 2eefd68 218->223 222->223 224 2eefd69 223->224 224->224
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EEFD0A
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: 3b1e070ecc29434164b85feb182bbaed2610156a71022aadc9a0c0976920b7f2
                                                                    • Instruction ID: 38843cd51926e54303229da7380c7aeb7b7efbcba57c0fbf611c4bbd2251ea73
                                                                    • Opcode Fuzzy Hash: 3b1e070ecc29434164b85feb182bbaed2610156a71022aadc9a0c0976920b7f2
                                                                    • Instruction Fuzzy Hash: A751ACB1D003099FDF14CFAAC984ADEBBB5BF48714F24912AE819AB210D7749985CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 225 2eea14c-2eebd94 DuplicateHandle 227 2eebd9d-2eebdba 225->227 228 2eebd96-2eebd9c 225->228 228->227
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02EEBCC6,?,?,?,?,?), ref: 02EEBD87
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: e72c73819ffb0b8984c71729803af3816728847fbec27df6fc25b9441d2f6b9d
                                                                    • Instruction ID: b2a1aa0a98df195e46541715a772b14962ad91be7de451dc01a8923bec372c2e
                                                                    • Opcode Fuzzy Hash: e72c73819ffb0b8984c71729803af3816728847fbec27df6fc25b9441d2f6b9d
                                                                    • Instruction Fuzzy Hash: 0F2103B5900209EFCB10CF9AD984ADEBBF4FB48324F14841AE915A7310C374A940CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 231 2eebcf9-2eebd94 DuplicateHandle 232 2eebd9d-2eebdba 231->232 233 2eebd96-2eebd9c 231->233 233->232
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02EEBCC6,?,?,?,?,?), ref: 02EEBD87
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: 0d3a61ed5d2d6ccec66513842e95aa124fd997b8fb990f50a26704ee2c7cb9d1
                                                                    • Instruction ID: ef5705404c3d31f7bbeabd4f1bd6ae2027847fc7ea890891560489b3567f9c22
                                                                    • Opcode Fuzzy Hash: 0d3a61ed5d2d6ccec66513842e95aa124fd997b8fb990f50a26704ee2c7cb9d1
                                                                    • Instruction Fuzzy Hash: 4121E3B59002499FDB10CFA9D584ADEBBF4FB48324F14851AE955B7210C378A954DFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 236 2ee8768-2ee9890 238 2ee9898-2ee98c7 LoadLibraryExW 236->238 239 2ee9892-2ee9895 236->239 240 2ee98c9-2ee98cf 238->240 241 2ee98d0-2ee98ed 238->241 239->238 240->241
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02EE96A9,00000800,00000000,00000000), ref: 02EE98BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 20be7fe479c9202f2d63aceb31c8832ac092b4a9db013f06e7c850f33b054147
                                                                    • Instruction ID: 7a858e463f5bcdd8a6ead6b20a8ad931b9b8208fe6a41be4ef90dd961312a364
                                                                    • Opcode Fuzzy Hash: 20be7fe479c9202f2d63aceb31c8832ac092b4a9db013f06e7c850f33b054147
                                                                    • Instruction Fuzzy Hash: 141106B6D003098FCB10CF9AC444ADEBBF4EB48324F14842ED526A7610C374A545CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 244 2ee9849-2ee9890 246 2ee9898-2ee98c7 LoadLibraryExW 244->246 247 2ee9892-2ee9895 244->247 248 2ee98c9-2ee98cf 246->248 249 2ee98d0-2ee98ed 246->249 247->246 248->249
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02EE96A9,00000800,00000000,00000000), ref: 02EE98BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 5b2d395e3dc8b29d2802e696c8043885d960eeff8886632e576ae7b430b2047e
                                                                    • Instruction ID: 7a8a98c947b6a321d74e986aa901b94cdd26bc3c70d9b080c9e5f0c87514d2c4
                                                                    • Opcode Fuzzy Hash: 5b2d395e3dc8b29d2802e696c8043885d960eeff8886632e576ae7b430b2047e
                                                                    • Instruction Fuzzy Hash: D01114B6D003098FDB10CF9AC484ADEFBF4EB88324F14842AD46AA7610C3B4A545CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 252 2ee95c8-2ee9608 253 2ee960a-2ee960d 252->253 254 2ee9610-2ee963b GetModuleHandleW 252->254 253->254 255 2ee963d-2ee9643 254->255 256 2ee9644-2ee9658 254->256 255->256
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 02EE962E
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 4d3bbf24e398176ef19c9892de18ef7755714726e3d6031364cca9261ff377a2
                                                                    • Instruction ID: d82e47ce18a0190ed8f50206bab9e72cd63fe88a5fff367cde721995e1b3c817
                                                                    • Opcode Fuzzy Hash: 4d3bbf24e398176ef19c9892de18ef7755714726e3d6031364cca9261ff377a2
                                                                    • Instruction Fuzzy Hash: 0911E0B6D0074A8FCB10CF9AC544ADEFBF4EF88324F14846AD45AA7610C3B4A545CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 258 2eeda3c-2eefeaa SetWindowLongW 260 2eefeac-2eefeb2 258->260 261 2eefeb3-2eefec7 258->261 260->261
                                                                    APIs
                                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02EEFE28,?,?,?,?), ref: 02EEFE9D
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow
                                                                    • String ID:
                                                                    • API String ID: 1378638983-0
                                                                    • Opcode ID: faadf0be8630e4442e07c100118ab06bf23dbb331213cbe4b682419da23aa424
                                                                    • Instruction ID: 5d40d04dc39517d37b5d9d30331bc3d238c5024ef4133e5000227d21f2cc5601
                                                                    • Opcode Fuzzy Hash: faadf0be8630e4442e07c100118ab06bf23dbb331213cbe4b682419da23aa424
                                                                    • Instruction Fuzzy Hash: 101136B59003498FCB10DF8AC584BDFBBF8EB48324F10845AE919A7701C3B4A940CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 263 2eefe38-2eefe3b 264 2eefe40-2eefeaa SetWindowLongW 263->264 265 2eefeac-2eefeb2 264->265 266 2eefeb3-2eefec7 264->266 265->266
                                                                    APIs
                                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02EEFE28,?,?,?,?), ref: 02EEFE9D
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.561586339.0000000002EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EE0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_2ee0000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow
                                                                    • String ID:
                                                                    • API String ID: 1378638983-0
                                                                    • Opcode ID: d35e10bbac886046d0f20b440f297b16119498bf5e95981c21dfbf889d00cfb0
                                                                    • Instruction ID: 823edf45a603a9241b999eb3b47a0b06cf8f3ae2661a5d191cbc1b0af80bc989
                                                                    • Opcode Fuzzy Hash: d35e10bbac886046d0f20b440f297b16119498bf5e95981c21dfbf889d00cfb0
                                                                    • Instruction Fuzzy Hash: A91133B59003099FDB10CF9AC584BDEBBF8EB48324F20845AD859B7700C3B4A980CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.558748614.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_dfd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 46b57c5a63eded5372e00d01ef5566309f43ada794f13a4061a0eb3bda27c03e
                                                                    • Instruction ID: ac00cc78d1c7333c0c43bf00fe1c8547863b57bd9ff02cdc16e0f92bf331fc40
                                                                    • Opcode Fuzzy Hash: 46b57c5a63eded5372e00d01ef5566309f43ada794f13a4061a0eb3bda27c03e
                                                                    • Instruction Fuzzy Hash: CC210372504244EFDB05DF54D8C0B2ABF67FB88324F28C669EA450B246C336D856DBB1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.558748614.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_dfd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6548f6b15e376aad0c6870de3de8a719fa745e8b7d9810405050262f4b1125a7
                                                                    • Instruction ID: 7a26da304a092190f21069eaeef1e0966a113409e414c81810de5df6afa2ae7c
                                                                    • Opcode Fuzzy Hash: 6548f6b15e376aad0c6870de3de8a719fa745e8b7d9810405050262f4b1125a7
                                                                    • Instruction Fuzzy Hash: 1221E2B1504248DFDB05DF14D9C0B26BF67FB94328F24C569DA450A216C336D846D6B1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.558748614.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_dfd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f906f83a178082e7d7d0a07ac00f86b8a262bd51881fd340313f04e9881f9409
                                                                    • Instruction ID: f84448b7d93a847ca39f7ac6a8adf6b8a59f6ff708bdecd5080509ff31d8a650
                                                                    • Opcode Fuzzy Hash: f906f83a178082e7d7d0a07ac00f86b8a262bd51881fd340313f04e9881f9409
                                                                    • Instruction Fuzzy Hash: 6B21D676504244DFCB16CF50D9C4B26BF72FB84314F28C6AADD440B656C336D85ACBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.558748614.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_dfd000_gNrfORqjCV.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                                                    • Instruction ID: f2000757dc53832e859e44df247915e83cf50eedbac3270789113391752262e2
                                                                    • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                                                                    • Instruction Fuzzy Hash: 0511D676504244CFDB16CF14D5C4B26BF72FB85324F28C6A9D9050B716C336D856CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%