Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gNrfORqjCV.exe

Overview

General Information

Sample Name:gNrfORqjCV.exe
Analysis ID:800437
MD5:60c8d91adfa30a60afa2f5437ce7d041
SHA1:f8460389f343481d7420073ad1da2f90ddedc696
SHA256:5707c702f70cc5bf864e10aaab48f9300e3be0a7892d8faa1810145f0af93d2d
Tags:exe
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • gNrfORqjCV.exe (PID: 5240 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
    • powershell.exe (PID: 492 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 1544 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5936 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • gNrfORqjCV.exe (PID: 5320 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
      • schtasks.exe (PID: 5256 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6016 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • GzGmImHFmOq.exe (PID: 5000 cmdline: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
    • schtasks.exe (PID: 5660 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • GzGmImHFmOq.exe (PID: 5544 cmdline: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • gNrfORqjCV.exe (PID: 5248 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe 0 MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
    • powershell.exe (PID: 1252 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 400 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 1640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5684 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • gNrfORqjCV.exe (PID: 1324 cmdline: C:\Users\user\Desktop\gNrfORqjCV.exe MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • dhcpmon.exe (PID: 4544 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • dhcpmon.exe (PID: 4720 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 60C8D91ADFA30A60AFA2F5437CE7D041)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "cb7cb109-a06b-4fd7-8d0e-5290e77d", "Group": "MOFASA", "Domain1": "nonoise.duckdns.org", "Domain2": "127.0.0.1", "Port": 6060, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "84.200.70.40", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0x1a3fe:$b5: GetBlockHash
    • 0x124fe:$b6: AddHostEntry
    • 0x161f1:$b7: LogClientException
    • 0x1246b:$b8: PipeExists
    • 0xffb7:$b9: IClientLoggingHost
    00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Click to see the 57 entries
      SourceRuleDescriptionAuthorStrings
      23.2.gNrfORqjCV.exe.398062c.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      23.2.gNrfORqjCV.exe.398062c.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      23.2.gNrfORqjCV.exe.398062c.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        23.2.gNrfORqjCV.exe.398062c.4.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
        • 0xd978:$x2: NanoCore.ClientPlugin
        • 0xd9ad:$x3: NanoCore.ClientPluginHost
        • 0xd96c:$i2: IClientData
        • 0xd98e:$i3: IClientNetwork
        • 0xd99d:$i5: IClientDataHost
        • 0xd9c7:$i6: IClientLoggingHost
        • 0xd9da:$i7: IClientNetworkHost
        • 0xd9ed:$i8: IClientUIHost
        • 0xd9fb:$i9: IClientNameObjectCollection
        • 0xda17:$i10: IClientReadOnlyNameObjectCollection
        • 0xd76a:$s1: ClientPlugin
        • 0xd981:$s1: ClientPlugin
        • 0x129a2:$s6: get_ClientSettings
        23.2.gNrfORqjCV.exe.398062c.4.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
        • 0xd9ad:$a1: NanoCore.ClientPluginHost
        • 0xd978:$a2: NanoCore.ClientPlugin
        • 0x128f3:$b1: get_BuilderSettings
        • 0x12862:$b7: LogClientException
        • 0xd9c7:$b9: IClientLoggingHost
        Click to see the 137 entries

        AV Detection

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Persistence and Installation Behavior

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\gNrfORqjCV.exe, ParentImage: C:\Users\user\Desktop\gNrfORqjCV.exe, ParentProcessId: 5240, ParentProcessName: gNrfORqjCV.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp, ProcessId: 5936, ProcessName: schtasks.exe

        Stealing of Sensitive Information

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\gNrfORqjCV.exe, ProcessId: 5320, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: gNrfORqjCV.exeReversingLabs: Detection: 64%
        Source: gNrfORqjCV.exeVirustotal: Detection: 58%Perma Link
        Source: nonoise.duckdns.orgAvira URL Cloud: Label: malware
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 64%
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeReversingLabs: Detection: 64%
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR
        Source: gNrfORqjCV.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJoe Sandbox ML: detected
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "cb7cb109-a06b-4fd7-8d0e-5290e77d", "Group": "MOFASA", "Domain1": "nonoise.duckdns.org", "Domain2": "127.0.0.1", "Port": 6060, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "84.200.70.40", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Source: gNrfORqjCV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: gNrfORqjCV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 4x nop then jmp 07E27B45h
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 4x nop then jmp 07E27B45h
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 4x nop then jmp 078916F5h
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 4x nop then jmp 078916F5h

        Networking

        barindex
        Source: Malware configuration extractorURLs: nonoise.duckdns.org
        Source: Malware configuration extractorURLs: 127.0.0.1
        Source: unknownDNS query: name: nonoise.duckdns.org
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: Joe Sandbox ViewIP Address: 194.5.98.24 194.5.98.24
        Source: global trafficTCP traffic: 192.168.2.5:49701 -> 194.5.98.24:6060
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.70.40
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: unknownUDP traffic detected without corresponding DNS query: 84.200.69.80
        Source: gNrfORqjCV.exe, 00000000.00000003.296515775.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296396139.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
        Source: gNrfORqjCV.exe, 00000000.00000003.295899082.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296138391.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296240339.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295949444.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296360113.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296039310.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296275045.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295980858.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296109893.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296305097.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003046000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.T
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comC
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCH
        Source: gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCk
        Source: gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTCp
        Source: gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comde
        Source: gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comego
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comlg
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.p
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coms0
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comsb
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057EB000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057F4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersR
        Source: gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersT
        Source: gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersb
        Source: gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerse
        Source: gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersl
        Source: gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersno
        Source: gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
        Source: gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFH
        Source: gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305277458.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305332327.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305058105.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305393745.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFu
        Source: gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalicS
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsFu
        Source: gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalso
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
        Source: gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
        Source: gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306618063.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306685172.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd$
        Source: gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdy
        Source: gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
        Source: gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessedQ
        Source: gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comf
        Source: gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comion
        Source: gNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comony
        Source: gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comuevo
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/de
        Source: gNrfORqjCV.exe, 00000000.00000003.297957541.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cna-e
        Source: gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnani
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298448695.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnicr
        Source: gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnno
        Source: gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cntra
        Source: gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/Z
        Source: gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/n
        Source: gNrfORqjCV.exe, 00000000.00000003.307784164.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: gNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/:
        Source: gNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302024144.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302116093.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/C
        Source: gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/u
        Source: gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/g
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: gNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/-
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/:
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/H
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/g
        Source: gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/u
        Source: gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/kurs
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t-i
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/u
        Source: gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/~
        Source: gNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: gNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.come
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: gNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krX
        Source: gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kra-d
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnde
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cni
        Source: gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnlg
        Source: gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
        Source: unknownDNS traffic detected: queries for: nonoise.duckdns.org
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR

        System Summary

        barindex
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.29cf1b4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.29ae42c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 15.2.dhcpmon.exe.2f69510.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 15.2.dhcpmon.exe.2f664f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 15.2.dhcpmon.exe.2f67504.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5320, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
        Source: gNrfORqjCV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.29cf1b4.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 28.2.GzGmImHFmOq.exe.31f9654.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.29ae42c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.305f274.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 8.2.gNrfORqjCV.exe.5810000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.2999588.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 15.2.dhcpmon.exe.2f69510.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 15.2.dhcpmon.exe.2f664f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 15.2.dhcpmon.exe.2f67504.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
        Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5320, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_0265C214
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_0265E648
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_0265E658
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E2273C
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E20040
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E20007
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_0286C214
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_0286E648
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_0286E658
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B0006
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B5041
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B0040
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B9B28
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B02E0
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_053B02D1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_02EEE480
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_02EEE471
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_02EEBBD4
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 8_2_06C10040
        Source: gNrfORqjCV.exeBinary or memory string: OriginalFilename vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000002.381347692.0000000007040000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000003.318367958.0000000007201000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoWRc.exe> vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000002.356107386.0000000003B35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000000.00000000.292278061.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoWRc.exe> vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000008.00000002.568193972.0000000004081000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 0000000E.00000002.425767553.0000000004195000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000002DFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 0000000E.00000002.425767553.0000000004203000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exeBinary or memory string: OriginalFilenameoWRc.exe> vs gNrfORqjCV.exe
        Source: gNrfORqjCV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: GzGmImHFmOq.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: gNrfORqjCV.exeReversingLabs: Detection: 64%
        Source: gNrfORqjCV.exeVirustotal: Detection: 58%
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile read: C:\Users\user\Desktop\gNrfORqjCV.exeJump to behavior
        Source: gNrfORqjCV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to behavior
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Users\user\AppData\Local\Temp\tmp78F4.tmpJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@37/23@20/2
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: gNrfORqjCV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5684:120:WilError_01
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{cb7cb109-a06b-4fd7-8d0e-5290e77da5a5}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_01
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMutant created: \Sessions\1\BaseNamedObjects\nPnroCzUduJadCsbkbUABOtLLtA
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5244:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1640:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4720:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5228:120:WilError_01
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: gNrfORqjCV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: gNrfORqjCV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: gNrfORqjCV.exe, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: GzGmImHFmOq.exe.0.dr, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.gNrfORqjCV.exe.430000.0.unpack, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.8.dr, SystemManager/frmBoard.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeCode function: 0_2_07E23603 push ebp; retf
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeCode function: 7_2_07893BCF push FFFFFF8Bh; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.680692465060209
        Source: initial sampleStatic PE information: section name: .text entropy: 7.680692465060209
        Source: initial sampleStatic PE information: section name: .text entropy: 7.680692465060209
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 23.2.gNrfORqjCV.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeJump to dropped file
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeFile opened: C:\Users\user\Desktop\gNrfORqjCV.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.29cf1b4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.29ae42c.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.2f69510.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.2f664f8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.2f67504.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4544, type: MEMORYSTR
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003043000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003043000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 5668Thread sleep time: -37665s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 5544Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1640Thread sleep time: -8301034833169293s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2492Thread sleep count: 9432 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1812Thread sleep time: -2767011611056431s >= -30000s
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe TID: 5008Thread sleep time: -37665s >= -30000s
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe TID: 4700Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 6032Thread sleep time: -16602069666338586s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 472Thread sleep time: -37665s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 4136Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1712Thread sleep time: -37665s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5020Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4276Thread sleep count: 9255 > 30
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2552Thread sleep time: -12912720851596678s >= -30000s
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2816Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6016Thread sleep time: -37665s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4760Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\gNrfORqjCV.exe TID: 5100Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe TID: 748Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9315
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9432
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeWindow / User API: threadDelayed 9459
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeWindow / User API: foregroundWindowGot 732
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9255
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8922
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 37665
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 37665
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 37665
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 00000016.00000002.428209955.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMemory written: C:\Users\user\Desktop\gNrfORqjCV.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeMemory written: C:\Users\user\Desktop\gNrfORqjCV.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeProcess created: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeProcess created: C:\Users\user\Desktop\gNrfORqjCV.exe C:\Users\user\Desktop\gNrfORqjCV.exe
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003100000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.561827065.00000000033E3000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.575711406.000000000747E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003183000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHaVph
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Users\user\Desktop\gNrfORqjCV.exe VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\gNrfORqjCV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: gNrfORqjCV.exe, 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: GzGmImHFmOq.exe, 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: gNrfORqjCV.exe, 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: gNrfORqjCV.exe, 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: GzGmImHFmOq.exe, 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: GzGmImHFmOq.exe, 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a74629.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f1fc08.14.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.397b7f6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3efe658.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.gNrfORqjCV.exe.5a70000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.3984c55.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f87248.11.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.434e5d0.11.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.gNrfORqjCV.exe.398062c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.gNrfORqjCV.exe.3ecba38.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.GzGmImHFmOq.exe.3f54628.13.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.gNrfORqjCV.exe.431b9b0.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5240, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5000, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 5248, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: gNrfORqjCV.exe PID: 1324, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: GzGmImHFmOq.exe PID: 5544, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        112
        Process Injection
        2
        Masquerading
        11
        Input Capture
        21
        Security Software Discovery
        Remote Services11
        Input Capture
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Scheduled Task/Job
        11
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        Exfiltration Over Bluetooth1
        Non-Standard Port
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
        Virtualization/Sandbox Evasion
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Remote Access Software
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer1
        Non-Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingData Transfer Size Limits21
        Application Layer Protocol
        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Hidden Files and Directories
        Cached Domain Credentials12
        System Information Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items3
        Obfuscated Files or Information
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
        Software Packing
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 800437 Sample: gNrfORqjCV.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 79 Malicious sample detected (through community Yara rule) 2->79 81 Antivirus detection for URL or domain 2->81 83 Multi AV Scanner detection for dropped file 2->83 85 12 other signatures 2->85 8 gNrfORqjCV.exe 7 2->8         started        12 gNrfORqjCV.exe 2->12         started        14 GzGmImHFmOq.exe 5 2->14         started        16 2 other processes 2->16 process3 file4 67 C:\Users\user\AppData\...behaviorgraphzGmImHFmOq.exe, PE32 8->67 dropped 69 C:\Users\...behaviorgraphzGmImHFmOq.exe:Zone.Identifier, ASCII 8->69 dropped 71 C:\Users\user\AppData\Local\...\tmp78F4.tmp, XML 8->71 dropped 73 C:\Users\user\AppData\...\gNrfORqjCV.exe.log, ASCII 8->73 dropped 89 Uses schtasks.exe or at.exe to add and modify task schedules 8->89 91 Adds a directory exclusion to Windows Defender 8->91 93 Injects a PE file into a foreign processes 8->93 18 gNrfORqjCV.exe 1 12 8->18         started        23 powershell.exe 21 8->23         started        25 powershell.exe 21 8->25         started        27 schtasks.exe 1 8->27         started        29 powershell.exe 12->29         started        31 powershell.exe 12->31         started        33 schtasks.exe 12->33         started        35 gNrfORqjCV.exe 12->35         started        95 Multi AV Scanner detection for dropped file 14->95 97 Machine Learning detection for dropped file 14->97 37 2 other processes 14->37 signatures5 process6 dnsIp7 75 nonoise.duckdns.org 194.5.98.24, 49701, 49702, 49705 DANILENKODE Netherlands 18->75 77 127.0.0.1 unknown unknown 18->77 61 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->61 dropped 63 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 18->63 dropped 65 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->65 dropped 87 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->87 39 schtasks.exe 18->39         started        41 schtasks.exe 18->41         started        43 conhost.exe 23->43         started        45 conhost.exe 25->45         started        47 conhost.exe 27->47         started        49 conhost.exe 29->49         started        51 conhost.exe 31->51         started        53 conhost.exe 33->53         started        55 conhost.exe 37->55         started        file8 signatures9 process10 process11 57 conhost.exe 39->57         started        59 conhost.exe 41->59         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        gNrfORqjCV.exe64%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        gNrfORqjCV.exe59%VirustotalBrowse
        gNrfORqjCV.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe64%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe64%ReversingLabsByteCode-MSIL.Trojan.NanoBot
        SourceDetectionScannerLabelLinkDownload
        23.2.gNrfORqjCV.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        8.2.gNrfORqjCV.exe.5a70000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        SourceDetectionScannerLabelLink
        nonoise.duckdns.org4%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://www.fontbureau.comessed0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/:0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/-0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.fontbureau.comalso0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.fontbureau.comcomd0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/C0%URL Reputationsafe
        http://en.w0%URL Reputationsafe
        http://www.fontbureau.comd$0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/-0%URL Reputationsafe
        http://www.founder.com.cn/cnicr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/g0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/H0%URL Reputationsafe
        http://www.founder.com.cn/cna-e0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/kurs0%VirustotalBrowse
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/:0%URL Reputationsafe
        http://www.founder.com.cn/cnno0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.fontbureau.comony0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.carterandcone.comC0%URL Reputationsafe
        http://www.fontbureau.comB.TTF0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/g0%URL Reputationsafe
        http://www.fontbureau.comcom0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sajatypeworks.come0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.fontbureau.comion0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/u0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.fontbureau.comf0%URL Reputationsafe
        http://www.fontbureau.comessedQ0%Avira URL Cloudsafe
        nonoise.duckdns.org100%Avira URL Cloudmalware
        http://www.fontbureau.comalsFu0%Avira URL Cloudsafe
        http://www.sandoll.co.kra-d0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/kurs0%Avira URL Cloudsafe
        http://www.sandoll.co.krX0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y0/u0%Avira URL Cloudsafe
        http://www.fontbureau.comFu0%Avira URL Cloudsafe
        http://www.founder.com.cn/cntra0%Avira URL Cloudsafe
        http://www.fontbureau.comalicS0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cni0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnani0%Avira URL Cloudsafe
        http://www.fontbureau.comuevo0%Avira URL Cloudsafe
        http://www.carterandcone.com.T0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnlg0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/t-i0%Avira URL Cloudsafe
        http://www.carterandcone.comTCH0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/n0%Avira URL Cloudsafe
        http://www.carterandcone.como.p0%Avira URL Cloudsafe
        http://www.fontbureau.comFH0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/de0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnde0%Avira URL Cloudsafe
        http://www.carterandcone.coms00%Avira URL Cloudsafe
        http://www.galapagosdesign.com/Z0%Avira URL Cloudsafe
        127.0.0.10%Avira URL Cloudsafe
        http://www.carterandcone.comlg0%Avira URL Cloudsafe
        http://www.fontbureau.comdy0%Avira URL Cloudsafe
        http://www.carterandcone.comde0%Avira URL Cloudsafe
        http://www.carterandcone.comego0%Avira URL Cloudsafe
        http://www.carterandcone.comsb0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        nonoise.duckdns.org
        194.5.98.24
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        nonoise.duckdns.orgtrue
        • Avira URL Cloud: malware
        unknown
        127.0.0.1true
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.sandoll.co.kra-dgNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.comd$gNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306618063.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306685172.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://www.fontbureau.com/designersgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.comessedgNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/kursgNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.comalsFugNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comgNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cThegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/:gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.sandoll.co.krXgNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/-gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.galapagosdesign.com/DPleasegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlgNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comalsogNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.urwpp.deDPleasegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cngNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namegNrfORqjCV.exe, 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, GzGmImHFmOq.exe, 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 0000000E.00000002.418053715.0000000003046000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.carterandcone.como.gNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comessedQgNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0/ugNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.galapagosdesign.com/gNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cntragNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comcomdgNrfORqjCV.exe, 00000000.00000003.304586978.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/HgNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersnogNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/CgNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302024144.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.302116093.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://en.wgNrfORqjCV.exe, 00000000.00000003.296515775.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296396139.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnigNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.carterandcone.comlgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comFugNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305277458.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305332327.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305058105.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305393745.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers/frere-jones.htmlgNrfORqjCV.exe, 00000000.00000003.304656866.00000000057F4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304586978.00000000057F3000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comalicSgNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/ugNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/tgNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/-gNrfORqjCV.exe, 00000000.00000003.301848813.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301817563.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301964183.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301753239.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301721274.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301786090.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnicrgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298448695.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.carterandcone.com.TgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/ggNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersGgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersFgNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comuevogNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cn/bThegNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/jp/HgNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnanigNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cna-egNrfORqjCV.exe, 00000000.00000003.297957541.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comFHgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.comgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cndegNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.zhongyicts.com.cnlggNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.goodfont.co.krgNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comgNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/degNrfORqjCV.exe, 00000000.00000003.298397850.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298272672.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298235609.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298328560.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comTCHgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/:gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersTgNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cnnogNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/~gNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301489951.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301383146.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersRgNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.typography.netDgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.como.pgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comonygNrfORqjCV.exe, 00000000.00000003.305453770.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmgNrfORqjCV.exe, 00000000.00000003.307784164.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comgNrfORqjCV.exe, 00000000.00000003.295899082.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296138391.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296240339.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295949444.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296360113.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296039310.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296275045.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.295980858.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296109893.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.296305097.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/ngNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/t-igNrfORqjCV.exe, 00000000.00000003.301275522.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designerslgNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.carterandcone.comCgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comB.TTFgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306515905.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305767077.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/ggNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comcomgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersegNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designersbgNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304821209.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krgNrfORqjCV.exe, 00000000.00000003.297685163.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297489904.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297575248.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.297537163.00000000057E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designerspgNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sajatypeworks.comegNrfORqjCV.exe, 00000000.00000003.294783811.00000000057C2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.coms0gNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designerssgNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.comgNrfORqjCV.exe, 00000000.00000003.306269906.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305929656.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305990317.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304720200.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305838770.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305608628.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306376678.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305713164.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304937014.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303190287.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304656866.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.305239978.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303341407.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306223458.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306133463.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306459708.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.306044876.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comTCgNrfORqjCV.exe, 00000000.00000003.298730476.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comdygNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303683488.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.carterandcone.comegogNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.galapagosdesign.com/ZgNrfORqjCV.exe, 00000000.00000003.307562749.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comiongNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comdegNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/jp/ugNrfORqjCV.exe, 00000000.00000003.300626397.00000000057DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/jp/gNrfORqjCV.exe, 00000000.00000003.300916137.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300843664.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301610181.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301642038.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301335862.00000000057E4000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301052807.00000000057E1000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.301545636.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comdgNrfORqjCV.exe, 00000000.00000003.304376908.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304071114.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303960292.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304218382.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.304481831.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.303851330.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comlggNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299600985.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299790040.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNgNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cngNrfORqjCV.exe, 00000000.00000003.298175941.00000000057DE000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298516176.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377796505.00000000069D2000.00000004.00000800.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298672055.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298849689.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300055029.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.300121923.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298912231.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299112643.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298027129.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.298051431.00000000057E0000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299908418.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.comfgNrfORqjCV.exe, 00000000.00000003.312305827.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312042266.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312179725.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312571385.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312116348.00000000057E2000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000002.377294989.00000000057E3000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.312473392.00000000057E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.carterandcone.comsbgNrfORqjCV.exe, 00000000.00000003.299416168.00000000057E8000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299451966.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299359743.00000000057E9000.00000004.00000020.00020000.00000000.sdmp, gNrfORqjCV.exe, 00000000.00000003.299189314.00000000057E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              194.5.98.24
                                              nonoise.duckdns.orgNetherlands
                                              208476DANILENKODEtrue
                                              IP
                                              127.0.0.1
                                              Joe Sandbox Version:36.0.0 Rainbow Opal
                                              Analysis ID:800437
                                              Start date and time:2023-02-07 13:54:09 +01:00
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 10m 23s
                                              Hypervisor based Inspection enabled:false
                                              Report type:light
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:30
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample file name:gNrfORqjCV.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@37/23@20/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HDC Information:
                                              • Successful, ratio: 0.9% (good quality ratio 0.8%)
                                              • Quality average: 67.6%
                                              • Quality standard deviation: 33.2%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
                                              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ctldl.windowsupdate.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              13:55:12API Interceptor731x Sleep call for process: gNrfORqjCV.exe modified
                                              13:55:20API Interceptor148x Sleep call for process: powershell.exe modified
                                              13:55:22Task SchedulerRun new task: GzGmImHFmOq path: C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              13:55:31Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\gNrfORqjCV.exe" s>$(Arg0)
                                              13:55:32Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                              13:55:35AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              13:55:40API Interceptor2x Sleep call for process: dhcpmon.exe modified
                                              13:55:42API Interceptor1x Sleep call for process: GzGmImHFmOq.exe modified
                                              No context
                                              No context
                                              No context
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):941568
                                              Entropy (8bit):7.676646011154186
                                              Encrypted:false
                                              SSDEEP:12288:77S45nJrTmHkFrVoaqnS/pjpkH7PRNNiJTp/cuP1FRkkYy27YBp7HwcBVw:nS4PkkFr2QJ6HdaTp081L4y2Qasw
                                              MD5:60C8D91ADFA30A60AFA2F5437CE7D041
                                              SHA1:F8460389F343481D7420073AD1DA2F90DDEDC696
                                              SHA-256:5707C702F70CC5BF864E10AAAB48F9300E3BE0A7892D8FAA1810145F0AF93D2D
                                              SHA-512:38DE4CFCD5A1E75AF8E730B7F459D545108306BCFE06C2D315FB70B72DD75F550F21E0078F7AE4214D03BBBC5FDD4A3DE8500254534842E6EB8321693F5062C0
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 64%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.c..............0..V..........>u... ........@.. ....................................@..................................t..O.................................................................................... ............... ..H............text...DU... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B................ u......H........K...B......-....................................................{....*..{....*V.(......}......}....*...0..C........u........6.,0(.....{.....{....o....,.(.....{.....{....o....+..+..*. ...U )UU.Z(.....{....o....X )UU.Z(.....{....o....X*.0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*&.(......*.0..V........(........}......}.......s"...}......+&...+...{.......(#......X.......-....X.......-.*...0...........rG.
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              Process:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:false
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:false
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:true
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):21748
                                              Entropy (8bit):5.600772758637283
                                              Encrypted:false
                                              SSDEEP:384:LtCRLq0gJcKuAax0rq/3ISVxyjulrItiiJ9glSJuyzSv0ZqbAVrdJQBR3BT+inY8:0KuAaxgUxyClrSSlBBs4wXoY8
                                              MD5:13AAEA93CDE8136DA48D5BF09ADF3B60
                                              SHA1:0450C3870498BB682CE4010CE9F85A1D6DC8774C
                                              SHA-256:C68305D299D55E533CD4DFA704D41EF40C81EB455BE38414FC6458A777A8C0F4
                                              SHA-512:460B8B08B988E680BDFD0869B5EB0E862A89099BB60A146F7A3EFA55CA9BDE803028C18FCFED4A5B154955C9A7ED42BD9B8801CD6AAC230E4F072B2CFA61595C
                                              Malicious:false
                                              Preview:@...e...............................d.7...b..........@..........H...............<@.^.L."My...::..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:very short file (no magic)
                                              Category:dropped
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3:U:U
                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                              Malicious:false
                                              Preview:1
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1301
                                              Entropy (8bit):5.111180834949932
                                              Encrypted:false
                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Pcxtn:cbk4oL600QydbQxIYODOLedq3Scj
                                              MD5:205A4E2EE65AB288C6B92DB204349ACF
                                              SHA1:2F645852F3AB280F7FC170545EDBC557356DE80E
                                              SHA-256:5FBCDCDB9CE1FDCA116227AFE38D307CEA461D64D653BD23F20BA3872EA85B72
                                              SHA-512:77550160EAB85A1B52DBCB26F4D6DA3C4BED08DB7E220AC320937EEABFEA3755C0EA0354D691C803CBF8100A96BB67B06C9C30829876BC5EFA7941A02E3331A5
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):1310
                                              Entropy (8bit):5.109425792877704
                                              Encrypted:false
                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                              Process:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              File Type:XML 1.0 document, ASCII text
                                              Category:dropped
                                              Size (bytes):1602
                                              Entropy (8bit):5.140535559819237
                                              Encrypted:false
                                              SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt2xvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT6v
                                              MD5:7249F2169DE65C5704FB934EEAF9D7BF
                                              SHA1:6A0CB99EB5C1D4ABB0F5A8A6993ABD92DAAC126A
                                              SHA-256:A8E9843BC4C116B227EF3AD89E1BE8CB9C501370421504FEB5E82C66C8879247
                                              SHA-512:64D47BBC462F714DE847F49C3FF66F0B9880CFBFB0EB8DE3FC8FE657FF12F9922E256225A91EED819A82B97BB5408053B7FBCB7F7889065C535C281F8B9DD82D
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:XML 1.0 document, ASCII text
                                              Category:dropped
                                              Size (bytes):1602
                                              Entropy (8bit):5.140535559819237
                                              Encrypted:false
                                              SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt2xvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT6v
                                              MD5:7249F2169DE65C5704FB934EEAF9D7BF
                                              SHA1:6A0CB99EB5C1D4ABB0F5A8A6993ABD92DAAC126A
                                              SHA-256:A8E9843BC4C116B227EF3AD89E1BE8CB9C501370421504FEB5E82C66C8879247
                                              SHA-512:64D47BBC462F714DE847F49C3FF66F0B9880CFBFB0EB8DE3FC8FE657FF12F9922E256225A91EED819A82B97BB5408053B7FBCB7F7889065C535C281F8B9DD82D
                                              Malicious:true
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:XML 1.0 document, ASCII text
                                              Category:dropped
                                              Size (bytes):1602
                                              Entropy (8bit):5.140535559819237
                                              Encrypted:false
                                              SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt2xvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT6v
                                              MD5:7249F2169DE65C5704FB934EEAF9D7BF
                                              SHA1:6A0CB99EB5C1D4ABB0F5A8A6993ABD92DAAC126A
                                              SHA-256:A8E9843BC4C116B227EF3AD89E1BE8CB9C501370421504FEB5E82C66C8879247
                                              SHA-512:64D47BBC462F714DE847F49C3FF66F0B9880CFBFB0EB8DE3FC8FE657FF12F9922E256225A91EED819A82B97BB5408053B7FBCB7F7889065C535C281F8B9DD82D
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:ISO-8859 text, with no line terminators
                                              Category:dropped
                                              Size (bytes):8
                                              Entropy (8bit):2.75
                                              Encrypted:false
                                              SSDEEP:3:KF:KF
                                              MD5:84F57A2CCBF5202D84064D529BC5F7F1
                                              SHA1:48D0C7CADD8EF77664087CAF8474E57C77FAB1AA
                                              SHA-256:BC484715C0A8CFC52127533FEFB1FE211599F6FD7CAC1183A15C1449E255DBFD
                                              SHA-512:B4AB763748F3F445E55CCF2A85A9684BF392E5903F4F8253C4F61637099419469895DB23C92EF5C9BC0138B325D57A40F75153C638BF371D41EE79AB0DED11CA
                                              Malicious:true
                                              Preview:.pV.V..H
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):38
                                              Entropy (8bit):4.405822250285692
                                              Encrypted:false
                                              SSDEEP:3:oNUWJRWCfqGi4A:oNNJACfq6A
                                              MD5:2C464CA33435236989E7B48201539321
                                              SHA1:BF6ED3B301DE5F4AE68C17E4CC826C70DE058248
                                              SHA-256:E8D74AB7595A22F57A930F896093E42870EFCF9CC6FF801D97F0E31073B03D28
                                              SHA-512:45E51DC7DCDD94F0EE2011AD5AE05A88E3D14825F0F4C46E9B8C55F19C7ECA4D096E28727D0BEA57590E9D02E030F12B001A4C4E53B382671084CA3CB51B7327
                                              Malicious:false
                                              Preview:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):941568
                                              Entropy (8bit):7.676646011154186
                                              Encrypted:false
                                              SSDEEP:12288:77S45nJrTmHkFrVoaqnS/pjpkH7PRNNiJTp/cuP1FRkkYy27YBp7HwcBVw:nS4PkkFr2QJ6HdaTp081L4y2Qasw
                                              MD5:60C8D91ADFA30A60AFA2F5437CE7D041
                                              SHA1:F8460389F343481D7420073AD1DA2F90DDEDC696
                                              SHA-256:5707C702F70CC5BF864E10AAAB48F9300E3BE0A7892D8FAA1810145F0AF93D2D
                                              SHA-512:38DE4CFCD5A1E75AF8E730B7F459D545108306BCFE06C2D315FB70B72DD75F550F21E0078F7AE4214D03BBBC5FDD4A3DE8500254534842E6EB8321693F5062C0
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 64%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.c..............0..V..........>u... ........@.. ....................................@..................................t..O.................................................................................... ............... ..H............text...DU... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B................ u......H........K...B......-....................................................{....*..{....*V.(......}......}....*...0..C........u........6.,0(.....{.....{....o....,.(.....{.....{....o....+..+..*. ...U )UU.Z(.....{....o....X )UU.Z(.....{....o....X*.0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*&.(......*.0..V........(........}......}.......s"...}......+&...+...{.......(#......X.......-....X.......-.*...0...........rG.
                                              Process:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.676646011154186
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:gNrfORqjCV.exe
                                              File size:941568
                                              MD5:60c8d91adfa30a60afa2f5437ce7d041
                                              SHA1:f8460389f343481d7420073ad1da2f90ddedc696
                                              SHA256:5707c702f70cc5bf864e10aaab48f9300e3be0a7892d8faa1810145f0af93d2d
                                              SHA512:38de4cfcd5a1e75af8e730b7f459d545108306bcfe06c2d315fb70b72dd75f550f21e0078f7ae4214d03bbbc5fdd4a3de8500254534842e6eb8321693f5062c0
                                              SSDEEP:12288:77S45nJrTmHkFrVoaqnS/pjpkH7PRNNiJTp/cuP1FRkkYy27YBp7HwcBVw:nS4PkkFr2QJ6HdaTp081L4y2Qasw
                                              TLSH:82159D5119AB43E6ECF98D7832B8E61826A28CD2476D9D3EBC863D7A8CF370F4451711
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.c..............0..V..........>u... ........@.. ....................................@................................
                                              Icon Hash:00828e8e8686b000
                                              Entrypoint:0x4e753e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x63C94CB9 [Thu Jan 19 13:59:21 2023 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xe74ec0x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x3a4.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xe55440xe5600False0.8197239015667575data7.680692465060209IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xe80000x3a40x400False0.3837890625data2.942309763240296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xea0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xe80580x348data
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSource PortDest PortSource IPDest IP
                                              Feb 7, 2023 13:55:35.385148048 CET497016060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:55:35.746256113 CET606049701194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:55:36.263089895 CET497016060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:55:36.502480984 CET606049701194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:55:37.060009956 CET497016060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:55:37.292237043 CET606049701194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:55:45.062972069 CET497026060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:55:45.285547972 CET606049702194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:55:45.967027903 CET497026060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:55:46.183325052 CET606049702194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:55:46.764082909 CET497026060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:55:46.995682001 CET606049702194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:08.145855904 CET497056060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:08.364366055 CET606049705194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:08.953275919 CET497056060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:09.165040970 CET606049705194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:09.765851021 CET497056060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:09.983294964 CET606049705194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:39.798890114 CET497126060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:40.003993034 CET606049712194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:40.518403053 CET497126060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:40.723225117 CET606049712194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:41.228743076 CET497126060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:41.443243027 CET606049712194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:54.732409954 CET497136060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:57.188936949 CET606049713194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:57.863878965 CET497136060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:58.096165895 CET606049713194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:56:58.598249912 CET497136060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:56:58.812616110 CET606049713194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:57:02.917262077 CET497156060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:57:05.326845884 CET606049715194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:57:05.842473984 CET497156060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:57:07.717140913 CET606049715194.5.98.24192.168.2.5
                                              Feb 7, 2023 13:57:08.230956078 CET497156060192.168.2.5194.5.98.24
                                              Feb 7, 2023 13:57:12.010140896 CET606049715194.5.98.24192.168.2.5
                                              TimestampSource PortDest PortSource IPDest IP
                                              Feb 7, 2023 13:55:34.256066084 CET6064953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:55:35.317756891 CET6064953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:55:35.370954037 CET536064984.200.69.80192.168.2.5
                                              Feb 7, 2023 13:55:44.998558044 CET5144153192.168.2.584.200.69.80
                                              Feb 7, 2023 13:55:45.034903049 CET535144184.200.69.80192.168.2.5
                                              Feb 7, 2023 13:55:53.838025093 CET4972453192.168.2.584.200.69.80
                                              Feb 7, 2023 13:55:54.828720093 CET4972453192.168.2.584.200.69.80
                                              Feb 7, 2023 13:55:57.980149031 CET4972453192.168.2.584.200.69.80
                                              Feb 7, 2023 13:55:59.984153032 CET4972453192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:04.031718969 CET4972453192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:08.101353884 CET6532353192.168.2.584.200.70.40
                                              Feb 7, 2023 13:56:08.142416954 CET536532384.200.70.40192.168.2.5
                                              Feb 7, 2023 13:56:31.261082888 CET5503953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:32.283844948 CET5503953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:33.328063011 CET5503953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:35.691873074 CET5503953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:39.746449947 CET5503953192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:39.797384977 CET535503984.200.69.80192.168.2.5
                                              Feb 7, 2023 13:56:45.474669933 CET6097553192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:46.489002943 CET6097553192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:47.535037041 CET6097553192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:49.536046982 CET6097553192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:53.621021986 CET6097553192.168.2.584.200.69.80
                                              Feb 7, 2023 13:56:53.668188095 CET536097584.200.69.80192.168.2.5
                                              Feb 7, 2023 13:57:02.882363081 CET5506853192.168.2.584.200.69.80
                                              Feb 7, 2023 13:57:02.916222095 CET535506884.200.69.80192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Feb 7, 2023 13:55:34.256066084 CET192.168.2.584.200.69.800x9980Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:35.317756891 CET192.168.2.584.200.69.800x9980Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:44.998558044 CET192.168.2.584.200.69.800x64c6Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:53.838025093 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:54.828720093 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:57.980149031 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:59.984153032 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:04.031718969 CET192.168.2.584.200.69.800x4229Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:08.101353884 CET192.168.2.584.200.70.400x8c8Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:31.261082888 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:32.283844948 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:33.328063011 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:35.691873074 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:39.746449947 CET192.168.2.584.200.69.800x790fStandard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:45.474669933 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:46.489002943 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:47.535037041 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:49.536046982 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:53.621021986 CET192.168.2.584.200.69.800x7de9Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:57:02.882363081 CET192.168.2.584.200.69.800x8867Standard query (0)nonoise.duckdns.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Feb 7, 2023 13:55:35.370954037 CET84.200.69.80192.168.2.50x9980No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:55:45.034903049 CET84.200.69.80192.168.2.50x64c6No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:08.142416954 CET84.200.70.40192.168.2.50x8c8No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:39.797384977 CET84.200.69.80192.168.2.50x790fNo error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:56:53.668188095 CET84.200.69.80192.168.2.50x7de9No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false
                                              Feb 7, 2023 13:57:02.916222095 CET84.200.69.80192.168.2.50x8867No error (0)nonoise.duckdns.org194.5.98.24A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Target ID:0
                                              Start time:13:55:01
                                              Start date:07/02/2023
                                              Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Imagebase:0x430000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.350708235.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.356107386.0000000003E97000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.350708235.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low

                                              Target ID:1
                                              Start time:13:55:13
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Imagebase:0xf00000
                                              File size:430592 bytes
                                              MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Reputation:high

                                              Target ID:2
                                              Start time:13:55:13
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:3
                                              Start time:13:55:14
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              Imagebase:0xf00000
                                              File size:430592 bytes
                                              MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Reputation:high

                                              Target ID:4
                                              Start time:13:55:14
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:5
                                              Start time:13:55:14
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp78F4.tmp
                                              Imagebase:0xcc0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:6
                                              Start time:13:55:14
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:7
                                              Start time:13:55:22
                                              Start date:07/02/2023
                                              Path:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              Imagebase:0x530000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.463703676.0000000003F1F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.454001802.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 64%, ReversingLabs
                                              Reputation:low

                                              Target ID:8
                                              Start time:13:55:25
                                              Start date:07/02/2023
                                              Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Imagebase:0xbb0000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.571677772.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.574171475.0000000005A70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.561827065.0000000003059000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low

                                              Target ID:10
                                              Start time:13:55:30
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp2556.tmp
                                              Imagebase:0xcc0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:11
                                              Start time:13:55:30
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:12
                                              Start time:13:55:31
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp27D7.tmp
                                              Imagebase:0xcc0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:13
                                              Start time:13:55:31
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:14
                                              Start time:13:55:32
                                              Start date:07/02/2023
                                              Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe 0
                                              Imagebase:0x820000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.425767553.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                              Target ID:15
                                              Start time:13:55:32
                                              Start date:07/02/2023
                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                              Imagebase:0x740000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.394849296.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 64%, ReversingLabs

                                              Target ID:16
                                              Start time:13:55:43
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Imagebase:0xf00000
                                              File size:430592 bytes
                                              MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET

                                              Target ID:17
                                              Start time:13:55:43
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:18
                                              Start time:13:55:43
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              Imagebase:0xf00000
                                              File size:430592 bytes
                                              MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET

                                              Target ID:19
                                              Start time:13:55:43
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:20
                                              Start time:13:55:43
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmpEAF8.tmp
                                              Imagebase:0xcc0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:21
                                              Start time:13:55:43
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Target ID:22
                                              Start time:13:55:44
                                              Start date:07/02/2023
                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                              Imagebase:0xc10000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:.Net C# or VB.NET

                                              Target ID:23
                                              Start time:13:55:50
                                              Start date:07/02/2023
                                              Path:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\gNrfORqjCV.exe
                                              Imagebase:0x4e0000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000017.00000002.436230882.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000017.00000002.440525605.0000000003939000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000017.00000002.439566387.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                              Target ID:26
                                              Start time:13:56:04
                                              Start date:07/02/2023
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzGmImHFmOq" /XML "C:\Users\user\AppData\Local\Temp\tmp389B.tmp
                                              Imagebase:0xcc0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language

                                              Target ID:27
                                              Start time:13:56:04
                                              Start date:07/02/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language

                                              Target ID:28
                                              Start time:13:56:07
                                              Start date:07/02/2023
                                              Path:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\GzGmImHFmOq.exe
                                              Imagebase:0xc50000
                                              File size:941568 bytes
                                              MD5 hash:60C8D91ADFA30A60AFA2F5437CE7D041
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001C.00000002.476397038.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                              No disassembly