Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CgpIx13Spu.exe

Overview

General Information

Sample Name:CgpIx13Spu.exe
Original Sample Name:dc586fef0d44e3b50964f916ab75a44f.exe
Analysis ID:877863
MD5:dc586fef0d44e3b50964f916ab75a44f
SHA1:d08b8281eebd2221521c333bdbb5d74aa8a92d0a
SHA256:6bac4b7f411a6895a9992b4ddce92d251dfe63c4aafab668d0c525de4eddd5f2
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • CgpIx13Spu.exe (PID: 7060 cmdline: C:\Users\user\Desktop\CgpIx13Spu.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • powershell.exe (PID: 1412 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 4028 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 3984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 2344 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • CgpIx13Spu.exe (PID: 7456 cmdline: C:\Users\user\Desktop\CgpIx13Spu.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
  • unFmnPEZpvL.exe (PID: 7336 cmdline: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • schtasks.exe (PID: 7740 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • unFmnPEZpvL.exe (PID: 7784 cmdline: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • unFmnPEZpvL.exe (PID: 7792 cmdline: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
  • dhcpmon.exe (PID: 7852 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: DC586FEF0D44E3B50964F916AB75A44F)
    • schtasks.exe (PID: 7916 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 7980 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: DC586FEF0D44E3B50964F916AB75A44F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "2b192589-e692-4024-abbd-8fa6959a", "Group": "Airy", "Domain1": "atelilian99.ddns.net", "Domain2": "127.0.0.1", "Port": 9387, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0x1a3fe:$b5: GetBlockHash
    • 0x124fe:$b6: AddHostEntry
    • 0x161f1:$b7: LogClientException
    • 0x1246b:$b8: PipeExists
    • 0xffb7:$b9: IClientLoggingHost
    0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xfbb:$a1: NanoCore.ClientPluginHost
    • 0xf7e:$a2: NanoCore.ClientPlugin
    Click to see the 51 entries
    SourceRuleDescriptionAuthorStrings
    19.2.dhcpmon.exe.2db9658.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    19.2.dhcpmon.exe.2db9658.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    19.2.dhcpmon.exe.2db9658.0.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xe38:$x2: NanoCore.ClientPlugin
    • 0xe75:$x3: NanoCore.ClientPluginHost
    • 0xe5a:$i1: IClientApp
    • 0xe4e:$i2: IClientData
    • 0xe29:$i3: IClientNetwork
    • 0xec3:$i4: IClientAppHost
    • 0xe65:$i5: IClientDataHost
    • 0xeb0:$i6: IClientLoggingHost
    • 0xe8f:$i7: IClientNetworkHost
    • 0xea2:$i8: IClientUIHost
    • 0xed2:$i9: IClientNameObjectCollection
    • 0xef7:$i10: IClientReadOnlyNameObjectCollection
    • 0xe41:$s1: ClientPlugin
    • 0x177c:$s1: ClientPlugin
    • 0x1789:$s1: ClientPlugin
    • 0x11f9:$s6: get_ClientSettings
    • 0x1249:$s7: get_Connected
    19.2.dhcpmon.exe.2db9658.0.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xe75:$a1: NanoCore.ClientPluginHost
    • 0xe38:$a2: NanoCore.ClientPlugin
    • 0x120c:$b1: get_BuilderSettings
    • 0xec3:$b4: IClientAppHost
    • 0x127d:$b6: AddHostEntry
    • 0x12ec:$b7: LogClientException
    • 0x1261:$b8: PipeExists
    • 0xeb0:$b9: IClientLoggingHost
    10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    Click to see the 114 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\CgpIx13Spu.exe, ParentImage: C:\Users\user\Desktop\CgpIx13Spu.exe, ParentProcessId: 7060, ParentProcessName: CgpIx13Spu.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp, ProcessId: 2344, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CgpIx13Spu.exe, ProcessId: 7456, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:213.152.162.181192.168.2.49387496962841753 05/30/23-06:23:12.736325
    SID:2841753
    Source Port:9387
    Destination Port:49696
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969793872025019 05/30/23-06:23:42.157295
    SID:2025019
    Source Port:49697
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969693872025019 05/30/23-06:23:12.265301
    SID:2025019
    Source Port:49696
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969593872025019 05/30/23-06:22:41.923978
    SID:2025019
    Source Port:49695
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969593872816766 05/30/23-06:22:42.804651
    SID:2816766
    Source Port:49695
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4213.152.162.1814969793872816766 05/30/23-06:23:43.464776
    SID:2816766
    Source Port:49697
    Destination Port:9387
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:213.152.162.181192.168.2.49387496952841753 05/30/23-06:22:43.336347
    SID:2841753
    Source Port:9387
    Destination Port:49695
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "2b192589-e692-4024-abbd-8fa6959a", "Group": "Airy", "Domain1": "atelilian99.ddns.net", "Domain2": "127.0.0.1", "Port": 9387, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177"}
    Source: CgpIx13Spu.exeReversingLabs: Detection: 64%
    Source: CgpIx13Spu.exeVirustotal: Detection: 54%Perma Link
    Source: atelilian99.ddns.netAvira URL Cloud: Label: malware
    Source: atelilian99.ddns.netVirustotal: Detection: 7%Perma Link
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 64%
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeReversingLabs: Detection: 64%
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR
    Source: CgpIx13Spu.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: CgpIx13Spu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: CgpIx13Spu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: ltlR.pdbSHA256 source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb} source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.pdbM source: CgpIx13Spu.exe, 0000000A.00000003.624498728.00000000066CC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ?\C:\Windows\dll\mscorlib.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ltlR.pdb source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 4x nop then jmp 0525CA0Bh9_2_0525BE50

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49695 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49695 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.162.181:9387 -> 192.168.2.4:49695
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49696 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 213.152.162.181:9387 -> 192.168.2.4:49696
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49697 -> 213.152.162.181:9387
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49697 -> 213.152.162.181:9387
    Source: Malware configuration extractorURLs: atelilian99.ddns.net
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: unknownDNS query: name: atelilian99.ddns.net
    Source: Joe Sandbox ViewASN Name: GLOBALLAYERNL GLOBALLAYERNL
    Source: Joe Sandbox ViewIP Address: 213.152.162.181 213.152.162.181
    Source: global trafficTCP traffic: 192.168.2.4:49695 -> 213.152.162.181:9387
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.177
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: CgpIx13Spu.exe, 00000000.00000002.561804154.0000000002731000.00000004.00000800.00020000.00000000.sdmp, unFmnPEZpvL.exe, 00000009.00000002.584415545.0000000002981000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.608708717.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
    Source: CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comD
    Source: CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comQ
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538631934.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTFQ
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/rep
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: CgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
    Source: CgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalics
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalicy
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsd
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomt
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdy
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comk
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlic
    Source: CgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commX
    Source: CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comttF
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: CgpIx13Spu.exe, 00000000.00000003.537123993.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/h
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
    Source: CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/5
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Q
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/U
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/h
    Source: CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/5
    Source: CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/r
    Source: CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/y
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
    Source: CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/y
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535187593.000000000502B000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535170566.000000000502B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com$$
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com$$
    Source: CgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comen-u
    Source: CgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comx
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: CgpIx13Spu.exe, 00000000.00000003.537379906.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537307172.000000000501F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: atelilian99.ddns.net
    Source: CgpIx13Spu.exe, 00000000.00000002.561041582.0000000000A80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR

    System Summary

    barindex
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: CgpIx13Spu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.dhcpmon.exe.2db9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.3c2b146.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.29b962c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.dhcpmon.exe.3d9b146.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.53a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.CgpIx13Spu.exe.2c12d5c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_00D1C1A40_2_00D1C1A4
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_00D1E5F00_2_00D1E5F0
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_00D1E5E10_2_00D1E5E1
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BDF7300_2_04BDF730
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BDF7700_2_04BDF770
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BD508F0_2_04BD508F
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_0A9900400_2_0A990040
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4C1A49_2_00D4C1A4
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4E5F09_2_00D4E5F0
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4E5E29_2_00D4E5E2
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0F7309_2_04D0F730
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0F7709_2_04D0F770
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0508F9_2_04D0508F
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_052500069_2_05250006
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_052500409_2_05250040
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05254F089_2_05254F08
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05254EF89_2_05254EF8
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_05251DC89_2_05251DC8
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_0525BE509_2_0525BE50
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_052519209_2_05251920
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 15_2_0291E48015_2_0291E480
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 15_2_0291E47115_2_0291E471
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 15_2_0291BBD415_2_0291BBD4
    Source: CgpIx13Spu.exe, 00000000.00000002.561041582.0000000000A80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 00000000.00000000.533514866.00000000002E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameltlR.exe: vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 00000000.00000002.572120993.0000000006DE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 00000000.00000002.564028371.00000000039A7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C48000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814999201.0000000005640000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exeBinary or memory string: OriginalFilenameltlR.exe: vs CgpIx13Spu.exe
    Source: CgpIx13Spu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: unFmnPEZpvL.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.10.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: CgpIx13Spu.exeReversingLabs: Detection: 64%
    Source: CgpIx13Spu.exeVirustotal: Detection: 54%
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: CgpIx13Spu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmpJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmpJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7EB8.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@26/17@43/2
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: CgpIx13Spu.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3984:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7924:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5200:120:WilError_01
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2b192589-e692-4024-abbd-8fa6959ae3b7}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7112:120:WilError_01
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\cmfUZmeJRtu
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_01
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: CgpIx13Spu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: CgpIx13Spu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: CgpIx13Spu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: ltlR.pdbSHA256 source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb} source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.pdbM source: CgpIx13Spu.exe, 0000000A.00000003.624498728.00000000066CC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ?\C:\Windows\dll\mscorlib.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ltlR.pdb source: CgpIx13Spu.exe, unFmnPEZpvL.exe.0.dr, dhcpmon.exe.10.dr

    Data Obfuscation

    barindex
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeCode function: 0_2_04BDAEC8 push esp; ret 0_2_04BDAED1
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_00D4F596 push es; iretd 9_2_00D4F5A6
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D00365 push es; iretd 9_2_04D00366
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D0E8F1 push eax; iretd 9_2_04D0E8FE
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D06BB8 push eax; iretd 9_2_04D06BC6
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D070A0 push edi; iretd 9_2_04D070CE
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D07C20 pushfd ; iretd 9_2_04D07C2E
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_04D07B93 pushfd ; iretd 9_2_04D07B96
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeCode function: 9_2_052565EA push edx; retf 9_2_052565EB
    Source: CgpIx13Spu.exeStatic PE information: 0xFB9F168F [Thu Oct 11 00:53:35 2103 UTC]
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76575096360064
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76575096360064
    Source: initial sampleStatic PE information: section name: .text entropy: 7.76575096360064
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to dropped file
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeFile opened: C:\Users\user\Desktop\CgpIx13Spu.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\CgpIx13Spu.exe TID: 7100Thread sleep time: -41202s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exe TID: 7072Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7044Thread sleep count: 9423 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7324Thread sleep time: -5534023222112862s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7420Thread sleep time: -3689348814741908s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe TID: 7340Thread sleep time: -41202s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe TID: 7432Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exe TID: 7592Thread sleep time: -19369081277395017s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe TID: 7820Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7856Thread sleep time: -41202s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7872Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 8008Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9423Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9091Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeWindow / User API: threadDelayed 9608Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeWindow / User API: foregroundWindowGot 1061Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 41202Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 41202Jump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: CgpIx13Spu.exe, 0000000A.00000002.802682699.0000000000E75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmpJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeProcess created: C:\Users\user\Desktop\CgpIx13Spu.exe C:\Users\user\Desktop\CgpIx13Spu.exeJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmpJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeProcess created: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: CgpIx13Spu.exe, 0000000A.00000002.815996906.0000000006C8D000.00000004.00000010.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002DA4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002C53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
    Source: CgpIx13Spu.exe, 0000000A.00000002.815154328.0000000005F1C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager8
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Users\user\Desktop\CgpIx13Spu.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Users\user\Desktop\CgpIx13Spu.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\CgpIx13Spu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: CgpIx13Spu.exe, 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLog
    Source: CgpIx13Spu.exe, 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: CgpIx13Spu.exe, 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: CgpIx13Spu.exe, 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: unFmnPEZpvL.exe, 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: unFmnPEZpvL.exe, 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: unFmnPEZpvL.exe, 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLog
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a4629.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.CgpIx13Spu.exe.55a0000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.39a45a5.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.399ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44ac2d8.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 15.2.unFmnPEZpvL.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ded18.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.unFmnPEZpvL.exe.44decf8.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.4274ed8.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.CgpIx13Spu.exe.42ac2f8.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7060, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7336, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: CgpIx13Spu.exe PID: 7456, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: unFmnPEZpvL.exe PID: 7792, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 7980, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    12
    Process Injection
    2
    Masquerading
    21
    Input Capture
    11
    Security Software Discovery
    Remote Services21
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Scheduled Task/Job
    11
    Disable or Modify Tools
    LSASS Memory2
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Remote System Discovery
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSync12
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
    Timestomp
    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 877863 Sample: CgpIx13Spu.exe Startdate: 30/05/2023 Architecture: WINDOWS Score: 100 68 Snort IDS alert for network traffic 2->68 70 Multi AV Scanner detection for domain / URL 2->70 72 Found malware configuration 2->72 74 13 other signatures 2->74 7 CgpIx13Spu.exe 7 2->7         started        11 unFmnPEZpvL.exe 5 2->11         started        13 dhcpmon.exe 2->13         started        process3 file4 52 C:\Users\user\AppData\...\unFmnPEZpvL.exe, PE32 7->52 dropped 54 C:\Users\...\unFmnPEZpvL.exe:Zone.Identifier, ASCII 7->54 dropped 56 C:\Users\user\AppData\Local\...\tmp7EB8.tmp, XML 7->56 dropped 58 C:\Users\user\AppData\...\CgpIx13Spu.exe.log, ASCII 7->58 dropped 76 Uses schtasks.exe or at.exe to add and modify task schedules 7->76 78 Adds a directory exclusion to Windows Defender 7->78 15 CgpIx13Spu.exe 1 10 7->15         started        20 powershell.exe 20 7->20         started        22 powershell.exe 19 7->22         started        24 schtasks.exe 1 7->24         started        80 Multi AV Scanner detection for dropped file 11->80 82 Machine Learning detection for dropped file 11->82 26 schtasks.exe 11->26         started        28 unFmnPEZpvL.exe 11->28         started        30 unFmnPEZpvL.exe 11->30         started        32 schtasks.exe 13->32         started        34 dhcpmon.exe 13->34         started        signatures5 process6 dnsIp7 60 atelilian99.ddns.net 213.152.162.181, 49695, 49696, 49697 GLOBALLAYERNL Netherlands 15->60 62 192.168.2.1 unknown unknown 15->62 46 C:\Program Files (x86)\...\dhcpmon.exe, PE32 15->46 dropped 48 C:\Users\user\AppData\Roaming\...\run.dat, data 15->48 dropped 50 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 15->50 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->64 36 conhost.exe 20->36         started        38 conhost.exe 22->38         started        40 conhost.exe 24->40         started        42 conhost.exe 26->42         started        44 conhost.exe 32->44         started        file8 66 Uses dynamic DNS services 60->66 signatures9 process10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    CgpIx13Spu.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    CgpIx13Spu.exe54%VirustotalBrowse
    CgpIx13Spu.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    No Antivirus matches
    SourceDetectionScannerLabelLink
    atelilian99.ddns.net8%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/50%URL Reputationsafe
    http://www.carterandcone.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
    http://www.carterandcone.comD0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
    http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.carterandcone.comQ0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.founder.com.cn/cn/h0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.fontbureau.comalsd0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/U0%URL Reputationsafe
    http://www.tiro.comx0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Q0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/r0%URL Reputationsafe
    http://www.fontbureau.comlic0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.com=0%Avira URL Cloudsafe
    http://www.fontbureau.comalics0%Avira URL Cloudsafe
    http://www.fontbureau.comttF0%Avira URL Cloudsafe
    http://www.fontbureau.comalicy0%Avira URL Cloudsafe
    http://www.fontbureau.comd0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/y0%URL Reputationsafe
    127.0.0.10%Avira URL Cloudsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/y0%URL Reputationsafe
    http://www.fontbureau.comk0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/h0%URL Reputationsafe
    http://www.fontbureau.commX0%Avira URL Cloudsafe
    http://www.fontbureau.com.TTFQ0%Avira URL Cloudsafe
    atelilian99.ddns.net100%Avira URL Cloudmalware
    http://www.sakkal.com$$0%Avira URL Cloudsafe
    http://www.fontbureau.comcomt0%Avira URL Cloudsafe
    http://www.fontbureau.comdy0%Avira URL Cloudsafe
    http://www.tiro.com$$0%Avira URL Cloudsafe
    http://www.tiro.comen-u0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    atelilian99.ddns.net
    213.152.162.181
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown
    atelilian99.ddns.nettrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designersGCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.comalicyCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.comalicsCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designers/?CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/bTheCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers?CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.tiro.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designersCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.goodfont.co.krCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/5CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comCgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comttFCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.sajatypeworks.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535187593.000000000502B000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.535170566.000000000502B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.typography.netDCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://fontfabrik.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/5CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.carterandcone.comDCgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/4CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp//CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/repCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.galapagosdesign.com/DPleaseCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comQCgpIx13Spu.exe, 00000000.00000003.538318448.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sandoll.co.krCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/hCgpIx13Spu.exe, 00000000.00000003.537123993.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnCgpIx13Spu.exe, 00000000.00000003.537379906.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537307172.000000000501F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCgpIx13Spu.exe, 00000000.00000002.561804154.0000000002731000.00000004.00000800.00020000.00000000.sdmp, unFmnPEZpvL.exe, 00000009.00000002.584415545.0000000002981000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.608708717.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.sakkal.comCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com=CgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.fontbureau.comalsdCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538631934.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/UCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.commXCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com.TTFQCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comxCgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/QCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdyCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.com$$CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.jiyu-kobo.co.jp/jp/rCgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comlicCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comcomtCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/CgpIx13Spu.exe, 00000000.00000003.538318448.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comaCgpIx13Spu.exe, 00000000.00000003.560043413.0000000005010000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdCgpIx13Spu.exe, 00000000.00000003.538803257.0000000005027000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/yCgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.com$$CgpIx13Spu.exe, 00000000.00000003.537483917.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.jiyu-kobo.co.jp/yCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comkCgpIx13Spu.exe, 00000000.00000003.538575060.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlCgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/Y0/CgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/rCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/CgpIx13Spu.exe, 00000000.00000003.537917015.0000000005026000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537796025.000000000501B000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8CgpIx13Spu.exe, 00000000.00000002.571214309.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/hCgpIx13Spu.exe, 00000000.00000003.538025853.0000000005020000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.538199722.0000000005026000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comen-uCgpIx13Spu.exe, 00000000.00000003.537123993.0000000005022000.00000004.00000020.00020000.00000000.sdmp, CgpIx13Spu.exe, 00000000.00000003.537095958.0000000005012000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            213.152.162.181
                            atelilian99.ddns.netNetherlands
                            49453GLOBALLAYERNLtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:877863
                            Start date and time:2023-05-30 06:21:08 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 9m 53s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:20
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:CgpIx13Spu.exe
                            Original Sample Name:dc586fef0d44e3b50964f916ab75a44f.exe
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@26/17@43/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 66
                            • Number of non-executed functions: 5
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe, WmiPrvSE.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            06:22:03API Interceptor939x Sleep call for process: CgpIx13Spu.exe modified
                            06:22:07Task SchedulerRun new task: unFmnPEZpvL path: C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                            06:22:07API Interceptor65x Sleep call for process: powershell.exe modified
                            06:22:13API Interceptor1x Sleep call for process: unFmnPEZpvL.exe modified
                            06:22:17AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            06:22:28API Interceptor1x Sleep call for process: dhcpmon.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            213.152.162.181ConstructionDocuments.oneGet hashmaliciousRemcos, DBatLoaderBrowse
                              $49000-PAYMENT-Copy_1.jsGet hashmaliciousADWIND, PrivateLoaderBrowse
                                payment copy.jsGet hashmaliciousADWIND, PrivateLoaderBrowse
                                  SecuriteInfo.com.Trojan.Win32.Injector.15ce2803.14478.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                    SecuriteInfo.com.Variant.Zusy.422205.9544.exeGet hashmaliciousDBatLoader NetWireBrowse
                                      SecuriteInfo.com.Variant.Zusy.422205.28942.exeGet hashmaliciousDBatLoader NetWireBrowse
                                        SecuriteInfo.com.Trojan.MalPack.18815.exeGet hashmaliciousNetWireBrowse
                                          Yddkxdueywhkiefjlsbskdfpfrlwnkzdin.exeGet hashmaliciousDBatLoader NetWireBrowse
                                            Gp2M1wXObH.exeGet hashmaliciousNetWireBrowse
                                              Fkskaogxaausqqhwhvbrltmsasszsywdva.exeGet hashmaliciousNetWireBrowse
                                                Hngvotwwxqrrqpozdzjwcpzajkixghmqfz.exeGet hashmaliciousDBatLoader NetWireBrowse
                                                  Mtxymgiuvaqhsnvczideuhnykrfdxiosoz.exeGet hashmaliciousDBatLoader NetWireBrowse
                                                    t4hwIvRdgG.exeGet hashmaliciousDBatLoader NetWireBrowse
                                                      Details.exeGet hashmaliciousNetWireBrowse
                                                        Xfjjrohctnjtfpybdnnlpymdeoujvvmcgj.exeGet hashmaliciousRemcosBrowse
                                                          Iomaxhrctxwofprickvoyatkswfgpenipp.exeGet hashmaliciousRemcos DBatLoaderBrowse
                                                            Uvnjtdnyzzyrqntxmdlgahpbcyrosnjtqn.exeGet hashmaliciousNetWireBrowse
                                                              Npzdfpgyvnitjebdxpoisvsjhvditiiqeg.exeGet hashmaliciousNetWireBrowse
                                                                uWNsC4gTOM.exeGet hashmaliciousNetWireBrowse
                                                                  Subnxxykeyoemprmnerznhkrqhoetfihem.exeGet hashmaliciousNetWireBrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    atelilian99.ddns.net1XJWu17cNS.exeGet hashmaliciousNanocore, zgRATBrowse
                                                                    • 45.139.105.174
                                                                    PBxnQ47MI0.exeGet hashmaliciousNanocoreBrowse
                                                                    • 79.134.225.74
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    GLOBALLAYERNLGjzoAhk1LN.exeGet hashmaliciousRemcosBrowse
                                                                    • 134.19.179.211
                                                                    https://2send.pics/www.google-analytics.com/cosmetics.lk.jsGet hashmaliciousUnknownBrowse
                                                                    • 5.188.86.195
                                                                    DIEN_CHUYEN_TIEN_SacomBank-TT_20230421-1191736-80192949.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                    • 213.152.161.138
                                                                    DLAWT.scr.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                    • 213.152.161.138
                                                                    xh0YFcjKpEZq.exeGet hashmaliciousQuasarBrowse
                                                                    • 213.152.162.79
                                                                    http://5.188.86.237Get hashmaliciousUnknownBrowse
                                                                    • 5.188.86.237
                                                                    NEW_ORDER_LIST_.xls.exeGet hashmaliciousNanocoreBrowse
                                                                    • 213.152.161.229
                                                                    List_of_PN_2612412-1A.exeGet hashmaliciousAveMaria, UACMeBrowse
                                                                    • 213.152.187.195
                                                                    DHL_AWB-5024310182061023.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                                    • 134.19.179.171
                                                                    vaqGXlZjqJ.exeGet hashmaliciousAsyncRATBrowse
                                                                    • 5.188.86.237
                                                                    unpacked.exeGet hashmaliciousNetWireBrowse
                                                                    • 213.152.162.109
                                                                    vEDQHAfrvH.exeGet hashmaliciousRemcosBrowse
                                                                    • 134.19.179.243
                                                                    #U8be2#U4ef7#U5230#U8ba2#U5355_Inquiry-to-Order-001030723_xlsx.exeGet hashmaliciousNanocore, zgRATBrowse
                                                                    • 213.152.161.118
                                                                    attached sample.exeGet hashmaliciousNanocore, AgentTeslaBrowse
                                                                    • 134.19.179.147
                                                                    Invoice.exeGet hashmaliciousNanocore, AgentTeslaBrowse
                                                                    • 134.19.179.147
                                                                    PO.230029.jsGet hashmaliciousWSHRat, VjW0rmBrowse
                                                                    • 134.19.179.195
                                                                    1W0OQF9pbD.exeGet hashmaliciousDBatLoader, NetWireBrowse
                                                                    • 134.19.176.119
                                                                    ConstructionDocuments.oneGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                    • 213.152.162.181
                                                                    sN46dZ5V3F.elfGet hashmaliciousMiraiBrowse
                                                                    • 185.229.58.104
                                                                    E7DP3Xaucg.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 213.152.184.125
                                                                    No context
                                                                    No context
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):696320
                                                                    Entropy (8bit):7.758655688397579
                                                                    Encrypted:false
                                                                    SSDEEP:12288:e2N8jiZ4zypIPsKtPplTY6RhKuYqwxCWeWNsx0+Mzhe4rJQzSINgh2cywOuZq7Ie:e2N8jiZ4zypIPsKJTDEqACUlhe4rJTX6
                                                                    MD5:DC586FEF0D44E3B50964F916AB75A44F
                                                                    SHA1:D08B8281EEBD2221521C333BDBB5D74AA8A92D0A
                                                                    SHA-256:6BAC4B7F411A6895A9992B4DDCE92D251DFE63C4AAFAB668D0C525DE4EDDD5F2
                                                                    SHA-512:2991BE29DCB33C7E50C40D36CBD116D22BC3846ED8283956B7096BD5F76998D250F2A5DF40D99CFEFD18BE6D0A5BAB1CE4D1C56E286C263E87DFABCBF6AEC87F
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 65%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................................@................................. ...O...................................H...p............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......@....[......a.......X...........................................^..}.....(.......(.....*...{.....o......{.....o......{.....o......(.....*....0...........r...p...(n...}.....{.....{....o......{....o.....o....r-..po......{....o.....o....r=..po......{....o.....o....rO..po......{....o.....o....ra..po......{....o.....o....rq..po......{....o.....o....ry..po......{....o.....o.....Po......{....o.....o.... ....o......{....o.....o.....Po......{....o.....o.....do......{....o.....
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):26
                                                                    Entropy (8bit):3.95006375643621
                                                                    Encrypted:false
                                                                    SSDEEP:3:ggPYV:rPYV
                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                    Malicious:true
                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):1302
                                                                    Entropy (8bit):5.3499841584777394
                                                                    Encrypted:false
                                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84bE4Ks:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                    MD5:4664C2114894A4BFC1E657FC08C72FF4
                                                                    SHA1:95A1E14E2AD65BCA561261DA3899074BF5276AED
                                                                    SHA-256:6E36229D13672B4304C696812B365F2E5657875DD0E11F13AE010566CC87607A
                                                                    SHA-512:4E7862716D5C0BC2174E819BAB329A2974FE83A36D5417EE732AB2F3D77D95620B3D462A1C9608F5FE90A48030140DE53DB642F8C370CD8E191BDBE83C638CA1
                                                                    Malicious:true
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1216
                                                                    Entropy (8bit):5.355304211458859
                                                                    Encrypted:false
                                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                    Process:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1216
                                                                    Entropy (8bit):5.355304211458859
                                                                    Encrypted:false
                                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):21896
                                                                    Entropy (8bit):5.595076717117252
                                                                    Encrypted:false
                                                                    SSDEEP:384:bQtCR7q09Q5cPxBn3wOYSBxnujulrItGiJ9g5SJ3uyV1Jm021AVrdAkY0A+iSYb:bw+PdY4xuClrSm5cuCX+b
                                                                    MD5:02D4F39296832B3BA6DAFCD848D4C7C8
                                                                    SHA1:3B380E1A9EE6548379DADFF26046C62440855F8E
                                                                    SHA-256:13C2C9F9A79D5ADFCEEF862EB65DD62B1811ACC9D03151CEE2045992D8B1F1AE
                                                                    SHA-512:F704279DD2875DB9120CF9135D93659F7C94E2798F897A7B892D713BE995D24B9119B319994F56BD27C95F952A82831B2E08EB946F39484C0E6865C509BF2A83
                                                                    Malicious:false
                                                                    Preview:@...e...............................(................@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:very short file (no magic)
                                                                    Category:dropped
                                                                    Size (bytes):1
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:U:U
                                                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                    Malicious:false
                                                                    Preview:1
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:very short file (no magic)
                                                                    Category:dropped
                                                                    Size (bytes):1
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:U:U
                                                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                    Malicious:false
                                                                    Preview:1
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:very short file (no magic)
                                                                    Category:dropped
                                                                    Size (bytes):1
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:U:U
                                                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                    Malicious:false
                                                                    Preview:1
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:very short file (no magic)
                                                                    Category:dropped
                                                                    Size (bytes):1
                                                                    Entropy (8bit):0.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:U:U
                                                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                    Malicious:false
                                                                    Preview:1
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:XML 1.0 document, ASCII text
                                                                    Category:dropped
                                                                    Size (bytes):1598
                                                                    Entropy (8bit):5.140726940577047
                                                                    Encrypted:false
                                                                    SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaExvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTbv
                                                                    MD5:70E4C0E48F210D390D9BC0D2AD175770
                                                                    SHA1:8B77A9E3693E06E70165AB847C5D1DF821E1D015
                                                                    SHA-256:19FEEE7B05F20D2D2BB60E224CCDC0D2EB3343811233C996C00893AF5D1C2812
                                                                    SHA-512:C4CF2E759CE1DFA5C9765D2F9952BD64B726674F5FC4571F91A6D9EC74C87E459863BFE95A74354784119F16ED6C00180F7D06D44A1C4B012DF6AAF234B2BE29
                                                                    Malicious:true
                                                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                                    Process:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    File Type:XML 1.0 document, ASCII text
                                                                    Category:dropped
                                                                    Size (bytes):1598
                                                                    Entropy (8bit):5.140726940577047
                                                                    Encrypted:false
                                                                    SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaExvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTbv
                                                                    MD5:70E4C0E48F210D390D9BC0D2AD175770
                                                                    SHA1:8B77A9E3693E06E70165AB847C5D1DF821E1D015
                                                                    SHA-256:19FEEE7B05F20D2D2BB60E224CCDC0D2EB3343811233C996C00893AF5D1C2812
                                                                    SHA-512:C4CF2E759CE1DFA5C9765D2F9952BD64B726674F5FC4571F91A6D9EC74C87E459863BFE95A74354784119F16ED6C00180F7D06D44A1C4B012DF6AAF234B2BE29
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                    File Type:XML 1.0 document, ASCII text
                                                                    Category:dropped
                                                                    Size (bytes):1598
                                                                    Entropy (8bit):5.140726940577047
                                                                    Encrypted:false
                                                                    SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaExvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTbv
                                                                    MD5:70E4C0E48F210D390D9BC0D2AD175770
                                                                    SHA1:8B77A9E3693E06E70165AB847C5D1DF821E1D015
                                                                    SHA-256:19FEEE7B05F20D2D2BB60E224CCDC0D2EB3343811233C996C00893AF5D1C2812
                                                                    SHA-512:C4CF2E759CE1DFA5C9765D2F9952BD64B726674F5FC4571F91A6D9EC74C87E459863BFE95A74354784119F16ED6C00180F7D06D44A1C4B012DF6AAF234B2BE29
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):232
                                                                    Entropy (8bit):7.024371743172393
                                                                    Encrypted:false
                                                                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                                                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                                                                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                                                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                                                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                                                    Malicious:false
                                                                    Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):8
                                                                    Entropy (8bit):3.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:YwEt:g
                                                                    MD5:C59B0B18C8475E4D66705A4A34FD91CC
                                                                    SHA1:E8398A8A8A6E4571DA88382D478E7021F567CDC4
                                                                    SHA-256:ECDDA12382ECCDB28601D1673E99A2E640563D92F2F40DB4A76B7A00EBA77B93
                                                                    SHA-512:A2BA3660F18E0D9BC1E96E11A9A35CDAF8E172C0811EBD4E227E9EBEF48E3FF92BF8B37B4C52768192351CD721FF144103ED8111F0859D722F2EE37BB93D3E2C
                                                                    Malicious:true
                                                                    Preview:5..r.`.H
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):696320
                                                                    Entropy (8bit):7.758655688397579
                                                                    Encrypted:false
                                                                    SSDEEP:12288:e2N8jiZ4zypIPsKtPplTY6RhKuYqwxCWeWNsx0+Mzhe4rJQzSINgh2cywOuZq7Ie:e2N8jiZ4zypIPsKJTDEqACUlhe4rJTX6
                                                                    MD5:DC586FEF0D44E3B50964F916AB75A44F
                                                                    SHA1:D08B8281EEBD2221521C333BDBB5D74AA8A92D0A
                                                                    SHA-256:6BAC4B7F411A6895A9992B4DDCE92D251DFE63C4AAFAB668D0C525DE4EDDD5F2
                                                                    SHA-512:2991BE29DCB33C7E50C40D36CBD116D22BC3846ED8283956B7096BD5F76998D250F2A5DF40D99CFEFD18BE6D0A5BAB1CE4D1C56E286C263E87DFABCBF6AEC87F
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 65%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................................@................................. ...O...................................H...p............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......@....[......a.......X...........................................^..}.....(.......(.....*...{.....o......{.....o......{.....o......(.....*....0...........r...p...(n...}.....{.....{....o......{....o.....o....r-..po......{....o.....o....r=..po......{....o.....o....rO..po......{....o.....o....ra..po......{....o.....o....rq..po......{....o.....o....ry..po......{....o.....o.....Po......{....o.....o.... ....o......{....o.....o.....Po......{....o.....o.....do......{....o.....
                                                                    Process:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):26
                                                                    Entropy (8bit):3.95006375643621
                                                                    Encrypted:false
                                                                    SSDEEP:3:ggPYV:rPYV
                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                    Malicious:true
                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):7.758655688397579
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    File name:CgpIx13Spu.exe
                                                                    File size:696320
                                                                    MD5:dc586fef0d44e3b50964f916ab75a44f
                                                                    SHA1:d08b8281eebd2221521c333bdbb5d74aa8a92d0a
                                                                    SHA256:6bac4b7f411a6895a9992b4ddce92d251dfe63c4aafab668d0c525de4eddd5f2
                                                                    SHA512:2991be29dcb33c7e50c40d36cbd116d22bc3846ed8283956b7096bd5f76998d250f2a5df40d99cfefd18be6d0a5bab1ce4d1c56e286c263e87dfabcbf6aec87f
                                                                    SSDEEP:12288:e2N8jiZ4zypIPsKtPplTY6RhKuYqwxCWeWNsx0+Mzhe4rJQzSINgh2cywOuZq7Ie:e2N8jiZ4zypIPsKJTDEqACUlhe4rJTX6
                                                                    TLSH:D8E402C43379AF46D873A7F4445452B8437EA86AB932E3430D83F0DA9AA5F444E91F1B
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................................@................................
                                                                    Icon Hash:90cececece8e8eb0
                                                                    Entrypoint:0x4ab472
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0xFB9F168F [Thu Oct 11 00:53:35 2103 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xab4200x4f.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x5ac.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xa94480x70.text
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000xa94780xa9600False0.9084986162361623data7.76575096360064IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0xac0000x5ac0x600False0.421875data4.087184081731354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0xae0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountry
                                                                    RT_VERSION0xac0900x31cdata
                                                                    RT_MANIFEST0xac3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain
                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                    213.152.162.181192.168.2.49387496962841753 05/30/23-06:23:12.736325TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)938749696213.152.162.181192.168.2.4
                                                                    192.168.2.4213.152.162.1814969793872025019 05/30/23-06:23:42.157295TCP2025019ET TROJAN Possible NanoCore C2 60B496979387192.168.2.4213.152.162.181
                                                                    192.168.2.4213.152.162.1814969693872025019 05/30/23-06:23:12.265301TCP2025019ET TROJAN Possible NanoCore C2 60B496969387192.168.2.4213.152.162.181
                                                                    192.168.2.4213.152.162.1814969593872025019 05/30/23-06:22:41.923978TCP2025019ET TROJAN Possible NanoCore C2 60B496959387192.168.2.4213.152.162.181
                                                                    192.168.2.4213.152.162.1814969593872816766 05/30/23-06:22:42.804651TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496959387192.168.2.4213.152.162.181
                                                                    192.168.2.4213.152.162.1814969793872816766 05/30/23-06:23:43.464776TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496979387192.168.2.4213.152.162.181
                                                                    213.152.162.181192.168.2.49387496952841753 05/30/23-06:22:43.336347TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)938749695213.152.162.181192.168.2.4
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    May 30, 2023 06:22:41.508732080 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:41.744621992 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:41.744760990 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:41.923978090 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:42.487500906 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:42.541939974 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:42.613882065 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:42.804510117 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:42.804651022 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.246304989 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.246417999 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.336347103 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.385773897 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.554548979 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.562437057 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.562505960 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.574924946 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.753716946 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.753774881 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.753797054 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.753832102 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.753838062 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.753882885 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:22:43.753887892 CEST938749695213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:22:43.753936052 CEST496959387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:12.071541071 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:12.264368057 CEST938749696213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:12.264554024 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:12.265300989 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:12.566230059 CEST938749696213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:12.568962097 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:12.736325026 CEST938749696213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:12.841810942 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:13.042467117 CEST938749696213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:13.051351070 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:13.077162981 CEST496969387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:41.984854937 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:42.156399965 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:42.156558037 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:42.157294989 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:42.584623098 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:42.584820032 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:42.594243050 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:42.640885115 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:42.996824980 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:42.997116089 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.184432983 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.197169065 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.464411020 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.464776039 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.472467899 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.472791910 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.655715942 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.655760050 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.655951977 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.662724018 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.662763119 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.662925005 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.895749092 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.896639109 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.896739006 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.896821976 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.896871090 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.896961927 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.903920889 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.904055119 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.904135942 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.904166937 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:43.904218912 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:43.904304028 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.075617075 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.075689077 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.075803995 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.076646090 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.076699018 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.076745987 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.076766968 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.076797962 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.076843977 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.076858997 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.083528042 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.083578110 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.083625078 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.083671093 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.083718061 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.083715916 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.083802938 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.084388971 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.084436893 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.084511042 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.084558964 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.084599018 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.084656954 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.315434933 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.315506935 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.315670013 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.316407919 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.316462040 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.316548109 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.316593885 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.316616058 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.316668987 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.317368031 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.317416906 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.317559004 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.317563057 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.317615032 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.317661047 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.317694902 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.318588972 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.318638086 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.318686962 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.318696976 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.318737030 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.318778992 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.319514990 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.319561005 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.319608927 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.319612026 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.319658041 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.319680929 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.319709063 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.319787025 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.320458889 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.320507050 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.320554018 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.320600986 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.320646048 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.320653915 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.320727110 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.321350098 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.321398020 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.321443081 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.321485043 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.321489096 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.321569920 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.322428942 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.322477102 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.322525024 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.322539091 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.322635889 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.391134024 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.495667934 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.495733976 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.495779991 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.495784044 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.495780945 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.495835066 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.495856047 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.495883942 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.495902061 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.495934963 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.495944977 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.495997906 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.503448963 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.503503084 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.503549099 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.503570080 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.503596067 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.503635883 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.503635883 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.503716946 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.504457951 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.504504919 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.504542112 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.504591942 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.504600048 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.504637957 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.504657030 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.504683018 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.504688978 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.504735947 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.505503893 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.505554914 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.505583048 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.505599976 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.505603075 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.505645037 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.505654097 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.505700111 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.506418943 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.506470919 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.506515980 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.506530046 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.506530046 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.506563902 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.506573915 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.506612062 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.506614923 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.506664038 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.507456064 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.507507086 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.507539034 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.507554054 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.507560015 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.507601976 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.507648945 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.507695913 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.507695913 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.507734060 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.511708021 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.511754990 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.511799097 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.511848927 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.511946917 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.512033939 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.512237072 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.512307882 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.512325048 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.512355089 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.512382030 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.512399912 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.512414932 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.512447119 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.512465954 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.512737989 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.513309956 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.513359070 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.513381004 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.513405085 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.513432980 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.513457060 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.513478994 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.513524055 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.514384031 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.514435053 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.514467955 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.514481068 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.514497995 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.514528990 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.514544964 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.514611006 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.514683008 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.515264034 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.515311956 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.515343904 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.515362024 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.515372038 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.515409946 CEST938749697213.152.162.181192.168.2.4
                                                                    May 30, 2023 06:23:44.515453100 CEST496979387192.168.2.4213.152.162.181
                                                                    May 30, 2023 06:23:44.515477896 CEST496979387192.168.2.4213.152.162.181
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    May 30, 2023 06:22:16.854002953 CEST5968353192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:18.062854052 CEST5968353192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:19.104496002 CEST5968353192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:21.104768991 CEST5968353192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:25.133699894 CEST5968353192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:29.209393024 CEST6416753192.168.2.437.235.1.177
                                                                    May 30, 2023 06:22:30.228588104 CEST6416753192.168.2.437.235.1.177
                                                                    May 30, 2023 06:22:31.275765896 CEST6416753192.168.2.437.235.1.177
                                                                    May 30, 2023 06:22:33.297673941 CEST6416753192.168.2.437.235.1.177
                                                                    May 30, 2023 06:22:37.396856070 CEST6416753192.168.2.437.235.1.177
                                                                    May 30, 2023 06:22:41.471667051 CEST6100753192.168.2.48.8.8.8
                                                                    May 30, 2023 06:22:41.498262882 CEST53610078.8.8.8192.168.2.4
                                                                    May 30, 2023 06:22:47.655108929 CEST6068653192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:48.653067112 CEST6068653192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:49.652857065 CEST6068653192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:51.699614048 CEST6068653192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:55.731234074 CEST6068653192.168.2.437.235.1.174
                                                                    May 30, 2023 06:22:59.801834106 CEST6112453192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:00.830032110 CEST6112453192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:01.873676062 CEST6112453192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:03.963443995 CEST6112453192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:07.951122046 CEST6112453192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:12.028436899 CEST5944453192.168.2.48.8.8.8
                                                                    May 30, 2023 06:23:12.056085110 CEST53594448.8.8.8192.168.2.4
                                                                    May 30, 2023 06:23:17.136106014 CEST5557053192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:18.196037054 CEST5557053192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:19.233864069 CEST5557053192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:21.248723030 CEST5557053192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:25.280725956 CEST5557053192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:29.805553913 CEST6490653192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:30.812082052 CEST6490653192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:31.828206062 CEST6490653192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:33.875144958 CEST6490653192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:37.921946049 CEST6490653192.168.2.437.235.1.177
                                                                    May 30, 2023 06:23:41.955786943 CEST5944653192.168.2.48.8.8.8
                                                                    May 30, 2023 06:23:41.981828928 CEST53594468.8.8.8192.168.2.4
                                                                    May 30, 2023 06:23:48.423970938 CEST5086153192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:49.425367117 CEST5086153192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:50.439079046 CEST5086153192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:52.485939980 CEST5086153192.168.2.437.235.1.174
                                                                    May 30, 2023 06:23:56.486330986 CEST5086153192.168.2.437.235.1.174
                                                                    May 30, 2023 06:24:00.524131060 CEST6108853192.168.2.437.235.1.177
                                                                    May 30, 2023 06:24:01.533629894 CEST6108853192.168.2.437.235.1.177
                                                                    May 30, 2023 06:24:02.533974886 CEST6108853192.168.2.437.235.1.177
                                                                    May 30, 2023 06:24:04.790138960 CEST6108853192.168.2.437.235.1.177
                                                                    May 30, 2023 06:24:13.178560972 CEST6108853192.168.2.437.235.1.177
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    May 30, 2023 06:22:16.854002953 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:18.062854052 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:19.104496002 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:21.104768991 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:25.133699894 CEST192.168.2.437.235.1.1740x5602Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:29.209393024 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:30.228588104 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:31.275765896 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:33.297673941 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:37.396856070 CEST192.168.2.437.235.1.1770xc79cStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:41.471667051 CEST192.168.2.48.8.8.80x76ecStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:47.655108929 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:48.653067112 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:49.652857065 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:51.699614048 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:55.731234074 CEST192.168.2.437.235.1.1740xfebStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:22:59.801834106 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:00.830032110 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:01.873676062 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:03.963443995 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:07.951122046 CEST192.168.2.437.235.1.1770xce51Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:12.028436899 CEST192.168.2.48.8.8.80xee70Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:17.136106014 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:18.196037054 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:19.233864069 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:21.248723030 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:25.280725956 CEST192.168.2.437.235.1.1740xba1Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:29.805553913 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:30.812082052 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:31.828206062 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:33.875144958 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:37.921946049 CEST192.168.2.437.235.1.1770x2c1fStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:41.955786943 CEST192.168.2.48.8.8.80x5c7dStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:48.423970938 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:49.425367117 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:50.439079046 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:52.485939980 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:56.486330986 CEST192.168.2.437.235.1.1740xe6d6Standard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:24:00.524131060 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:24:01.533629894 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:24:02.533974886 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:24:04.790138960 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:24:13.178560972 CEST192.168.2.437.235.1.1770x88fbStandard query (0)atelilian99.ddns.netA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    May 30, 2023 06:22:41.498262882 CEST8.8.8.8192.168.2.40x76ecNo error (0)atelilian99.ddns.net213.152.162.181A (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:12.056085110 CEST8.8.8.8192.168.2.40xee70No error (0)atelilian99.ddns.net213.152.162.181A (IP address)IN (0x0001)false
                                                                    May 30, 2023 06:23:41.981828928 CEST8.8.8.8192.168.2.40x5c7dNo error (0)atelilian99.ddns.net213.152.162.181A (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:06:22:00
                                                                    Start date:30/05/2023
                                                                    Path:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    Imagebase:0x2e0000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.564028371.0000000004274000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.564028371.0000000003731000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    Reputation:low

                                                                    Target ID:2
                                                                    Start time:06:22:05
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    Imagebase:0x10c0000
                                                                    File size:430592 bytes
                                                                    MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Reputation:high

                                                                    Target ID:3
                                                                    Start time:06:22:05
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7c72c0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:4
                                                                    Start time:06:22:05
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Imagebase:0x10c0000
                                                                    File size:430592 bytes
                                                                    MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Reputation:high

                                                                    Target ID:5
                                                                    Start time:06:22:05
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7c72c0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:6
                                                                    Start time:06:22:05
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmp7EB8.tmp
                                                                    Imagebase:0x200000
                                                                    File size:185856 bytes
                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:7
                                                                    Start time:06:22:05
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7c72c0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:9
                                                                    Start time:06:22:07
                                                                    Start date:30/05/2023
                                                                    Path:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Imagebase:0x410000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.586418916.00000000044AC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 65%, ReversingLabs
                                                                    Reputation:low

                                                                    Target ID:10
                                                                    Start time:06:22:11
                                                                    Start date:30/05/2023
                                                                    Path:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\Desktop\CgpIx13Spu.exe
                                                                    Imagebase:0x7a0000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.812707754.0000000003C2B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.814395614.00000000053A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.814807006.00000000055A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.804694487.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    Reputation:low

                                                                    Target ID:12
                                                                    Start time:06:22:20
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpB1AF.tmp
                                                                    Imagebase:0x200000
                                                                    File size:185856 bytes
                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:13
                                                                    Start time:06:22:20
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7c72c0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:14
                                                                    Start time:06:22:21
                                                                    Start date:30/05/2023
                                                                    Path:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Imagebase:0x2d0000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:15
                                                                    Start time:06:22:21
                                                                    Start date:30/05/2023
                                                                    Path:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\AppData\Roaming\unFmnPEZpvL.exe
                                                                    Imagebase:0x5b0000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000F.00000002.596149804.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000F.00000002.600559154.0000000003959000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000F.00000002.599720023.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                                                    Target ID:16
                                                                    Start time:06:22:26
                                                                    Start date:30/05/2023
                                                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                                                    Imagebase:0x7d0000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 65%, ReversingLabs

                                                                    Target ID:17
                                                                    Start time:06:22:29
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unFmnPEZpvL" /XML "C:\Users\user\AppData\Local\Temp\tmpDAE1.tmp
                                                                    Imagebase:0x200000
                                                                    File size:185856 bytes
                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:18
                                                                    Start time:06:22:29
                                                                    Start date:30/05/2023
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7c72c0000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:19
                                                                    Start time:06:22:30
                                                                    Start date:30/05/2023
                                                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                    Imagebase:0x970000
                                                                    File size:696320 bytes
                                                                    MD5 hash:DC586FEF0D44E3B50964F916AB75A44F
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.621550048.0000000003D9B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.621139694.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:11.2%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:208
                                                                      Total number of Limit Nodes:9
                                                                      execution_graph 25708 d140d0 25709 d140e2 25708->25709 25710 d140ee 25709->25710 25714 d141e0 25709->25714 25719 d13c64 25710->25719 25712 d1410d 25715 d14205 25714->25715 25723 d142d0 25715->25723 25727 d142e0 25715->25727 25720 d13c6f 25719->25720 25735 d151a4 25720->25735 25722 d16a80 25722->25712 25725 d14307 25723->25725 25724 d143e4 25724->25724 25725->25724 25731 d13de4 25725->25731 25729 d14307 25727->25729 25728 d143e4 25728->25728 25729->25728 25730 d13de4 CreateActCtxA 25729->25730 25730->25728 25732 d15370 CreateActCtxA 25731->25732 25734 d15433 25732->25734 25736 d151af 25735->25736 25739 d157f8 25736->25739 25738 d16b25 25738->25722 25740 d15803 25739->25740 25743 d15828 25740->25743 25742 d16c02 25742->25738 25744 d15833 25743->25744 25747 d15858 25744->25747 25746 d16d02 25746->25742 25748 d15863 25747->25748 25750 d1741e 25748->25750 25758 4bd6a28 25748->25758 25761 4bd6a18 25748->25761 25764 4bdd7e2 25748->25764 25767 4bddde0 25748->25767 25770 4bdd7f0 25748->25770 25773 4bdddd1 25748->25773 25749 d1745c 25749->25746 25750->25749 25778 d1b330 25750->25778 25783 d19308 25758->25783 25759 4bd6a36 25759->25750 25762 4bd6a36 25761->25762 25763 d19308 LoadLibraryExW 25761->25763 25762->25750 25763->25762 25765 4bdd7ff 25764->25765 25800 4bdd8ea 25764->25800 25765->25750 25803 4bdde37 25767->25803 25768 4bdddee 25768->25750 25772 4bdd8ea LoadLibraryExW 25770->25772 25771 4bdd7ff 25771->25750 25772->25771 25774 4bddddf 25773->25774 25775 4bddd9b 25773->25775 25776 4bdddee 25774->25776 25777 4bdde37 LoadLibraryExW 25774->25777 25775->25750 25776->25750 25777->25776 25779 d1b361 25778->25779 25780 d1b385 25779->25780 25806 d1b5f8 25779->25806 25810 d1b5e8 25779->25810 25780->25749 25784 d1931b 25783->25784 25785 d1932b 25784->25785 25788 d19998 25784->25788 25792 d19988 25784->25792 25785->25759 25790 d199ac 25788->25790 25789 d199d1 25789->25785 25790->25789 25796 d194f8 25790->25796 25793 d199ac 25792->25793 25794 d194f8 LoadLibraryExW 25793->25794 25795 d199d1 25793->25795 25794->25795 25795->25785 25797 d19b78 LoadLibraryExW 25796->25797 25799 d19bf1 25797->25799 25799->25789 25802 d19308 LoadLibraryExW 25800->25802 25801 4bdd90a 25801->25765 25802->25801 25805 d19308 LoadLibraryExW 25803->25805 25804 4bdde57 25804->25768 25805->25804 25807 d1b605 25806->25807 25809 d1b63f 25807->25809 25814 d197f8 25807->25814 25809->25780 25811 d1b605 25810->25811 25812 d197f8 LoadLibraryExW 25811->25812 25813 d1b63f 25811->25813 25812->25813 25813->25780 25815 d19803 25814->25815 25817 d1c338 25815->25817 25818 d198c0 25815->25818 25817->25817 25819 d198cb 25818->25819 25820 d15858 LoadLibraryExW 25819->25820 25821 d1c3a7 25819->25821 25820->25821 25825 d1e128 25821->25825 25832 d1e102 25821->25832 25822 d1c3e0 25822->25817 25827 d1e1a5 25825->25827 25828 d1e159 25825->25828 25826 d1e164 25826->25822 25827->25822 25828->25826 25829 d1e5e1 LoadLibraryExW 25828->25829 25830 d1e598 LoadLibraryExW 25828->25830 25831 d1e5a8 LoadLibraryExW 25828->25831 25829->25827 25830->25827 25831->25827 25833 d1e164 25832->25833 25834 d1e106 25832->25834 25833->25822 25834->25833 25835 d1e5e1 LoadLibraryExW 25834->25835 25836 d1e598 LoadLibraryExW 25834->25836 25837 d1e5a8 LoadLibraryExW 25834->25837 25835->25833 25836->25833 25837->25833 25838 d19210 25840 d19308 LoadLibraryExW 25838->25840 25839 d1921f 25840->25839 25841 d1b710 GetCurrentProcess 25842 d1b783 25841->25842 25843 d1b78a GetCurrentThread 25841->25843 25842->25843 25844 d1b7c0 25843->25844 25845 d1b7c7 GetCurrentProcess 25843->25845 25844->25845 25846 d1b7fd 25845->25846 25847 d1b825 GetCurrentThreadId 25846->25847 25848 d1b856 25847->25848 25954 d198f0 25955 d19932 25954->25955 25956 d19938 GetModuleHandleW 25954->25956 25955->25956 25957 d19965 25956->25957 25849 4bdf1f8 25851 4bd6a28 LoadLibraryExW 25849->25851 25852 4bd6a18 LoadLibraryExW 25849->25852 25853 4bdddd1 LoadLibraryExW 25849->25853 25854 4bddde0 LoadLibraryExW 25849->25854 25850 4bdf242 25851->25850 25852->25850 25853->25850 25854->25850 25958 d1fd78 25959 d1fde0 CreateWindowExW 25958->25959 25961 d1fe9c 25959->25961 25962 d1b938 DuplicateHandle 25963 d1b9ce 25962->25963 25906 4bd50a0 25907 4bd50cd 25906->25907 25920 4bd4b68 25907->25920 25909 4bd5134 25910 4bd4b68 LoadLibraryExW 25909->25910 25911 4bd5166 25910->25911 25925 4bd4b78 25911->25925 25914 4bd4b78 LoadLibraryExW 25915 4bd51ca 25914->25915 25929 4bd4b88 25915->25929 25918 4bd4b88 LoadLibraryExW 25919 4bd522e 25918->25919 25921 4bd4b73 25920->25921 25924 d15858 LoadLibraryExW 25921->25924 25933 d17170 25921->25933 25922 4bd624b 25922->25909 25924->25922 25926 4bd4b83 25925->25926 25944 4bd4d00 25926->25944 25928 4bd5198 25928->25914 25930 4bd4b93 25929->25930 25949 4bdccf0 25930->25949 25932 4bd51fc 25932->25918 25934 d17175 25933->25934 25936 d1741e 25934->25936 25937 4bd6a28 LoadLibraryExW 25934->25937 25938 4bd6a18 LoadLibraryExW 25934->25938 25939 4bdddd1 LoadLibraryExW 25934->25939 25940 4bdd7f0 LoadLibraryExW 25934->25940 25941 4bddde0 LoadLibraryExW 25934->25941 25942 4bdd7e2 LoadLibraryExW 25934->25942 25935 d1745c 25935->25922 25936->25935 25943 d1b330 LoadLibraryExW 25936->25943 25937->25936 25938->25936 25939->25936 25940->25936 25941->25936 25942->25936 25943->25935 25945 4bd4d0b 25944->25945 25946 4bd70f2 25945->25946 25947 d17170 LoadLibraryExW 25945->25947 25948 d15858 LoadLibraryExW 25945->25948 25946->25928 25947->25946 25948->25946 25950 4bdccfb 25949->25950 25952 d17170 LoadLibraryExW 25950->25952 25953 d15858 LoadLibraryExW 25950->25953 25951 4bddd54 25951->25932 25952->25951 25953->25951 25964 4bd0040 SetWindowLongW 25965 4bd00ac 25964->25965 25855 93d01c 25856 93d034 25855->25856 25857 93d08e 25856->25857 25860 4bd0ca8 25856->25860 25866 4bd0c98 25856->25866 25861 4bd0cd5 25860->25861 25862 4bd0d07 25861->25862 25872 4bd0efc 25861->25872 25878 4bd0e22 25861->25878 25883 4bd0e30 25861->25883 25867 4bd0cd5 25866->25867 25868 4bd0d07 25867->25868 25869 4bd0efc 2 API calls 25867->25869 25870 4bd0e30 2 API calls 25867->25870 25871 4bd0e22 2 API calls 25867->25871 25869->25868 25870->25868 25871->25868 25873 4bd0eba 25872->25873 25874 4bd0f0a 25872->25874 25888 4bd0ee8 25873->25888 25891 4bd0ed8 25873->25891 25875 4bd0ed0 25875->25862 25880 4bd0e44 25878->25880 25879 4bd0ed0 25879->25862 25881 4bd0ee8 2 API calls 25880->25881 25882 4bd0ed8 2 API calls 25880->25882 25881->25879 25882->25879 25884 4bd0e44 25883->25884 25886 4bd0ee8 2 API calls 25884->25886 25887 4bd0ed8 2 API calls 25884->25887 25885 4bd0ed0 25885->25862 25886->25885 25887->25885 25889 4bd0ef9 25888->25889 25894 4bd2381 25888->25894 25889->25875 25892 4bd0ef9 25891->25892 25893 4bd2381 2 API calls 25891->25893 25892->25875 25893->25892 25898 4bd23b0 25894->25898 25902 4bd23a0 25894->25902 25895 4bd239a 25895->25889 25899 4bd23f2 25898->25899 25901 4bd23f9 25898->25901 25900 4bd244a CallWindowProcW 25899->25900 25899->25901 25900->25901 25901->25895 25903 4bd23f2 25902->25903 25905 4bd23f9 25902->25905 25904 4bd244a CallWindowProcW 25903->25904 25903->25905 25904->25905 25905->25895
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2c4eda48d8aa4716014aaa81c5dfa2382c9665524b3eab6c22837e00419f0933
                                                                      • Instruction ID: 88f419e2aa4affc3fcb07cc5c5dee432c4a1069771c732d72424ebe373535df9
                                                                      • Opcode Fuzzy Hash: 2c4eda48d8aa4716014aaa81c5dfa2382c9665524b3eab6c22837e00419f0933
                                                                      • Instruction Fuzzy Hash: 02A2B134A01629CFDB24DF64C994BD9B7B2BF89301F1181E9D409AB365EB30AE85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 84044c49bec8128fcfb45cead3f147ff335885af50c6d8187e66c04ef1425db3
                                                                      • Instruction ID: cbd6bf85e7c22156afe3a77a568f7a55ed7323bb8a859aa4d7a2ba72cfe555ac
                                                                      • Opcode Fuzzy Hash: 84044c49bec8128fcfb45cead3f147ff335885af50c6d8187e66c04ef1425db3
                                                                      • Instruction Fuzzy Hash: DDF15C74E042598FDB14DFA9C580AADFBB2FF89305F2481A9D905A7349D734AD42CF60
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.573592396.000000000A990000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A990000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_a990000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: aae7d8d0348e5ef3cc353f354c18aa90610470467afa3576f27facccdc62bd64
                                                                      • Instruction ID: 441b5f6fba0a4ce8448782781522d4032a781357288ca206482cbfe5aa742cf4
                                                                      • Opcode Fuzzy Hash: aae7d8d0348e5ef3cc353f354c18aa90610470467afa3576f27facccdc62bd64
                                                                      • Instruction Fuzzy Hash: C3D1DD30700340AFDB69DB79D851BAEBBEAAF89300F14446DD166DB291DF34E902CB61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 552e28861dffd3ec86fa39e82afc8fb17e6bd0c6faff50a4c3b166ec344e3398
                                                                      • Instruction ID: f7466b6372b5334e37ba9560885b070c7b71c58fc469224ee8676137f0d2c786
                                                                      • Opcode Fuzzy Hash: 552e28861dffd3ec86fa39e82afc8fb17e6bd0c6faff50a4c3b166ec344e3398
                                                                      • Instruction Fuzzy Hash: 18C149B1911B46CBD710CF65FC882897BB1BB85328F504308D161AB7F8D7B4254AEFA4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D1B770
                                                                      • GetCurrentThread.KERNEL32 ref: 00D1B7AD
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D1B7EA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D1B843
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID: OAB
                                                                      • API String ID: 2063062207-3665554293
                                                                      • Opcode ID: cb52630cbb26a6c0154e06338e399d21b4c4f1a4ec4f36210736764dc2b03698
                                                                      • Instruction ID: a94e382c3433ada0a837676b46c5154e23dc94e12be26d6c77cdec4eacf30683
                                                                      • Opcode Fuzzy Hash: cb52630cbb26a6c0154e06338e399d21b4c4f1a4ec4f36210736764dc2b03698
                                                                      • Instruction Fuzzy Hash: BE5167B09006498FDB10CFAAD948BDEBFF1BF48314F24815AE449A73A1DB785884CF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D1B770
                                                                      • GetCurrentThread.KERNEL32 ref: 00D1B7AD
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D1B7EA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D1B843
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID: OAB
                                                                      • API String ID: 2063062207-3665554293
                                                                      • Opcode ID: 60f417ffe76f3b466cba80d5a43d859ad11462e0a0a22423f709047b27015882
                                                                      • Instruction ID: be074c01ca957ed52ebb24fb4b888ce4315643de0461485c27e581724bc05243
                                                                      • Opcode Fuzzy Hash: 60f417ffe76f3b466cba80d5a43d859ad11462e0a0a22423f709047b27015882
                                                                      • Instruction Fuzzy Hash: FC5167B09006489FDB10CFAAD948BDEBBF5BF48314F24805AE449A3390DB785884CF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 38 d1fd6c-d1fdde 39 d1fde0-d1fde6 38->39 40 d1fde9-d1fdf0 38->40 39->40 41 d1fdf2-d1fdf8 40->41 42 d1fdfb-d1fe33 40->42 41->42 43 d1fe3b-d1fe9a CreateWindowExW 42->43 44 d1fea3-d1fedb 43->44 45 d1fe9c-d1fea2 43->45 49 d1fee8 44->49 50 d1fedd-d1fee0 44->50 45->44 51 d1fee9 49->51 50->49 51->51
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D1FE8A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID: OAB$OAB
                                                                      • API String ID: 716092398-442714386
                                                                      • Opcode ID: 4d8f780457de6d2bd75932475eb6e8a55df346c7c59144369c5ea52611592110
                                                                      • Instruction ID: 4dcf2012ae902680685c108bd97163ef1872c698d3f9b2e9768da52bd0a87b46
                                                                      • Opcode Fuzzy Hash: 4d8f780457de6d2bd75932475eb6e8a55df346c7c59144369c5ea52611592110
                                                                      • Instruction Fuzzy Hash: ED51D2B1D00349AFDF14DFA9D884ADEBFB5BF48310F24812AE419AB251D7759885CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 52 d1fd78-d1fdde 53 d1fde0-d1fde6 52->53 54 d1fde9-d1fdf0 52->54 53->54 55 d1fdf2-d1fdf8 54->55 56 d1fdfb-d1fe9a CreateWindowExW 54->56 55->56 58 d1fea3-d1fedb 56->58 59 d1fe9c-d1fea2 56->59 63 d1fee8 58->63 64 d1fedd-d1fee0 58->64 59->58 65 d1fee9 63->65 64->63 65->65
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D1FE8A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID: OAB$OAB
                                                                      • API String ID: 716092398-442714386
                                                                      • Opcode ID: e45aa9b2b7c0e587e7a90b1147c382553c886fcdc5eabb4482fb0d9ef6491625
                                                                      • Instruction ID: 4fbe4aeda5953104d16fc338a9b5ec3ec9be49f631db4eeb55e5f09425be3e4b
                                                                      • Opcode Fuzzy Hash: e45aa9b2b7c0e587e7a90b1147c382553c886fcdc5eabb4482fb0d9ef6491625
                                                                      • Instruction Fuzzy Hash: BA41B2B1D00309AFDF14CF99D984ADEBBB5BF48310F24812AE419AB251D7749985CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 102 d13de4-d15431 CreateActCtxA 105 d15433-d15439 102->105 106 d1543a-d15494 102->106 105->106 113 d154a3-d154a7 106->113 114 d15496-d15499 106->114 115 d154a9-d154b5 113->115 116 d154b8 113->116 114->113 115->116 118 d154b9 116->118 118->118
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 00D15421
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID: OAB
                                                                      • API String ID: 2289755597-3665554293
                                                                      • Opcode ID: e5fc26a1608e8803721eee811f8bbd89c55cd08f45eca2776b51f823f4c256d1
                                                                      • Instruction ID: 11b4241529e713bfc3151609770fdda816b242ac4532f2b674b95c826b1a151c
                                                                      • Opcode Fuzzy Hash: e5fc26a1608e8803721eee811f8bbd89c55cd08f45eca2776b51f823f4c256d1
                                                                      • Instruction Fuzzy Hash: 7641F271C00618DFDB24DFA9D884BCDBBB5BF88314F208069D408AB255DBB96985CFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 119 4bd23b0-4bd23ec 120 4bd249c-4bd24bc 119->120 121 4bd23f2-4bd23f7 119->121 128 4bd24bf-4bd24cc 120->128 122 4bd23f9-4bd2430 121->122 123 4bd244a-4bd2482 CallWindowProcW 121->123 129 4bd2439-4bd2448 122->129 130 4bd2432-4bd2438 122->130 124 4bd248b-4bd249a 123->124 125 4bd2484-4bd248a 123->125 124->128 125->124 129->128 130->129
                                                                      APIs
                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04BD2471
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: CallProcWindow
                                                                      • String ID: OAB
                                                                      • API String ID: 2714655100-3665554293
                                                                      • Opcode ID: 87af705955c258723fe2f40eebede6c08c41cb58a35b2c09c0bdaa27e4ca5504
                                                                      • Instruction ID: 2001b871fe4d187d802b46d7aa7b5ebadf26d621dbd1d9e2a52a938c55e72bc4
                                                                      • Opcode Fuzzy Hash: 87af705955c258723fe2f40eebede6c08c41cb58a35b2c09c0bdaa27e4ca5504
                                                                      • Instruction Fuzzy Hash: AD413DB5A00345CFCB14CF99C488A9ABBF5FF88314F25C599E519AB321D774A841CFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 133 4bd0006-4bd00aa SetWindowLongW 134 4bd00ac-4bd00b2 133->134 135 4bd00b3-4bd00c7 133->135 134->135
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 04BD009D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID: OAB
                                                                      • API String ID: 1378638983-3665554293
                                                                      • Opcode ID: 9a6be240f3c5e9ed595e32b00298db20a2b950e59b931d5a1a3f1e8fabd8a4a3
                                                                      • Instruction ID: 6a4a4202abcbd705aba293a4dcd900c9f998ed98f7e86a0b23ccfc2ac3446c34
                                                                      • Opcode Fuzzy Hash: 9a6be240f3c5e9ed595e32b00298db20a2b950e59b931d5a1a3f1e8fabd8a4a3
                                                                      • Instruction Fuzzy Hash: 0A219AB58003489FDB11DF99D984BDEBFF4EF49324F15809AD944A7241D3386949CFA2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 137 d1b932-d1b9cc DuplicateHandle 138 d1b9d5-d1b9f2 137->138 139 d1b9ce-d1b9d4 137->139 139->138
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D1B9BF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID: OAB
                                                                      • API String ID: 3793708945-3665554293
                                                                      • Opcode ID: 1f0b9485f3fc0c103f17d421cc6fc5d7a638ecde2da5806a938619aa32073d70
                                                                      • Instruction ID: 85e46bfcdb4ddaf14cb8cc90822e5f3c6bf7f4c23f9643261a5ef89237983ed2
                                                                      • Opcode Fuzzy Hash: 1f0b9485f3fc0c103f17d421cc6fc5d7a638ecde2da5806a938619aa32073d70
                                                                      • Instruction Fuzzy Hash: 812105B5900209AFDB10CFAAD984ADEBFF4EB58320F14845AE955A3310D378A944CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 142 d1b938-d1b9cc DuplicateHandle 143 d1b9d5-d1b9f2 142->143 144 d1b9ce-d1b9d4 142->144 144->143
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D1B9BF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID: OAB
                                                                      • API String ID: 3793708945-3665554293
                                                                      • Opcode ID: 2d87af86fa3868bdb9fb080f593e3de2e24556927adad90c11dbcd3ae8748c60
                                                                      • Instruction ID: 748d1dc7c3a11509eec61a69eaf232314ec475cbe44db5eddb236aebd5bf31c6
                                                                      • Opcode Fuzzy Hash: 2d87af86fa3868bdb9fb080f593e3de2e24556927adad90c11dbcd3ae8748c60
                                                                      • Instruction Fuzzy Hash: 6821E4B5900218AFDB10CF9AD984ADEBFF8EB48320F14841AE954A3310D378A944CFA4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 147 d194f8-d19bb8 149 d19bc0-d19bef LoadLibraryExW 147->149 150 d19bba-d19bbd 147->150 151 d19bf1-d19bf7 149->151 152 d19bf8-d19c15 149->152 150->149 151->152
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00D199D1,00000800,00000000,00000000), ref: 00D19BE2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID: OAB
                                                                      • API String ID: 1029625771-3665554293
                                                                      • Opcode ID: 80b6b22851148e42d39bfff43e60bf67db403bc4a1a751c83790b0e4cf39cc70
                                                                      • Instruction ID: c352b7d9b46a81e070a94412a6fb6ddefc492d20b87227f380d273656f4abb2e
                                                                      • Opcode Fuzzy Hash: 80b6b22851148e42d39bfff43e60bf67db403bc4a1a751c83790b0e4cf39cc70
                                                                      • Instruction Fuzzy Hash: AD1147B69042089FCB10CF9AD584ADEFBF8EB58310F14842AE415A7200C7B8A945CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 155 d19b74-d19bb8 156 d19bc0-d19bef LoadLibraryExW 155->156 157 d19bba-d19bbd 155->157 158 d19bf1-d19bf7 156->158 159 d19bf8-d19c15 156->159 157->156 158->159
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00D199D1,00000800,00000000,00000000), ref: 00D19BE2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID: OAB
                                                                      • API String ID: 1029625771-3665554293
                                                                      • Opcode ID: dce44a761e843c4a2ed5ca402101df4f1128c607bfca5420f94e3012ffddef04
                                                                      • Instruction ID: c1be487937ad0bf4b883dc1fe1fa00b3955c0e29bac68c6601d405a56c7604ad
                                                                      • Opcode Fuzzy Hash: dce44a761e843c4a2ed5ca402101df4f1128c607bfca5420f94e3012ffddef04
                                                                      • Instruction Fuzzy Hash: 911126B6D042499FCB10CFAAE594BDEFBF4AB98310F14852ED419B7600C778A545CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 162 d198e8-d19930 163 d19932-d19935 162->163 164 d19938-d19963 GetModuleHandleW 162->164 163->164 165 d19965-d1996b 164->165 166 d1996c-d19980 164->166 165->166
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00D19956
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID: OAB
                                                                      • API String ID: 4139908857-3665554293
                                                                      • Opcode ID: 042f5805be806cbff040d7bcf11b44d9ceb73166d33234276b73a2d0cd841471
                                                                      • Instruction ID: 6b1dbb0c7dae4242a05bf477bd77830100fac1468aa3fc0c2d9607e9ed8ff48e
                                                                      • Opcode Fuzzy Hash: 042f5805be806cbff040d7bcf11b44d9ceb73166d33234276b73a2d0cd841471
                                                                      • Instruction Fuzzy Hash: F21132B5C002498FCB10CFAAD444ACEFBF4AF49324F14846AD469B7710D3B9A585CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 168 d198f0-d19930 169 d19932-d19935 168->169 170 d19938-d19963 GetModuleHandleW 168->170 169->170 171 d19965-d1996b 170->171 172 d1996c-d19980 170->172 171->172
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00D19956
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID: OAB
                                                                      • API String ID: 4139908857-3665554293
                                                                      • Opcode ID: f40768ce1ad0368ad65b16ccd4a29e7485cd1417bb9186f8051a10364d9d82df
                                                                      • Instruction ID: 6e98edd1715f48231858b5c0d2383dc62880fe238f8a787fc6a17551bf4e90f7
                                                                      • Opcode Fuzzy Hash: f40768ce1ad0368ad65b16ccd4a29e7485cd1417bb9186f8051a10364d9d82df
                                                                      • Instruction Fuzzy Hash: 75110FB6C002498FCB10CF9AD444ADEFBF8AB88324F14842AD469B7700D378A585CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 04BD009D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID: OAB
                                                                      • API String ID: 1378638983-3665554293
                                                                      • Opcode ID: b7e083012e6d0df9fe95452eac211b2766120aec41902bf3d2f3b15cb098ae09
                                                                      • Instruction ID: 304e742d50b8f6c8b40a3952f29ab75da255aaa43262764f648c5b393272e29a
                                                                      • Opcode Fuzzy Hash: b7e083012e6d0df9fe95452eac211b2766120aec41902bf3d2f3b15cb098ae09
                                                                      • Instruction Fuzzy Hash: 451115B58002089FDB10DF9AD584BDEBBF8EB48324F20845AD815B7700D378A944CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560870364.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_92d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8dd0333b12cd9285f911ef1e428583cc240f20f94d07114edf210bf6162066c8
                                                                      • Instruction ID: 33751fc77b5c1362041a3edf465fce567afb1b598107317bd26ad12f23d13f2d
                                                                      • Opcode Fuzzy Hash: 8dd0333b12cd9285f911ef1e428583cc240f20f94d07114edf210bf6162066c8
                                                                      • Instruction Fuzzy Hash: 4221F471504240DFDB01DF14E9C0F26BF65FB94318F24C569E8050A25EC37AD845DAA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560917777.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_93d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a54c5e38eef60216581f85c741e664bc8b2b58daa112ce3ff0355ebc7a29f65a
                                                                      • Instruction ID: 992c4540a7f8f0cfc10c325cb8ecc2bf325caeca67cca0e4e302ee60a1e78f85
                                                                      • Opcode Fuzzy Hash: a54c5e38eef60216581f85c741e664bc8b2b58daa112ce3ff0355ebc7a29f65a
                                                                      • Instruction Fuzzy Hash: 6C212675504240EFDB05DF54E9D0B27BBA5FB84314F24CA6DE8494B242C73AD846CF61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560917777.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_93d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 27ccbd2402af17fbfcc7a8887d896f304f39204cbfe00b62151f6ac353d1fc0a
                                                                      • Instruction ID: 136efd8f8e5f0d62ee2579c86cad57044af75a13d38cf125918479b5ab8b9e97
                                                                      • Opcode Fuzzy Hash: 27ccbd2402af17fbfcc7a8887d896f304f39204cbfe00b62151f6ac353d1fc0a
                                                                      • Instruction Fuzzy Hash: 9A210775504240DFDB19DF14E5D0B26BFA5FB84714F24C96DE8494B246C33AD847CE61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560917777.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_93d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 107b4de351461cae8d23860de958454b27de48cf2ae108eea7613cdf17820886
                                                                      • Instruction ID: 005d25dfd9f502f0abd53fbf15cf83b23c846cd5db66601c710e08ba477c4b38
                                                                      • Opcode Fuzzy Hash: 107b4de351461cae8d23860de958454b27de48cf2ae108eea7613cdf17820886
                                                                      • Instruction Fuzzy Hash: 64217F755093C08FCB16CF24D9A0715BF71EB46314F28C5EAD8898F697C33A980ACB62
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560870364.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_92d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                                                      • Instruction ID: 843b1b464f0f749501de6356523e66bd65072da458ca2cc4554bf970fd554071
                                                                      • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                                                      • Instruction Fuzzy Hash: 4F11E676504280DFDB12CF14D5C4F56BF72FB84324F24C6A9E8454B61AC33AD856CBA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560917777.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_93d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                                                      • Instruction ID: a52b36c7a93a56fcea49dc22c6b4acf90ef083fe41979fe843cf3d34cbecf51b
                                                                      • Opcode Fuzzy Hash: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                                                      • Instruction Fuzzy Hash: 49118B75904280DFDB12CF14D5D4B16BBB2FB84324F28C6AAD8494B656C33AD85ACF62
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560870364.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_92d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ee1631c23aa7082525ed19512f9bc82bd002a4d07bdbb1c277fde6b9563646c5
                                                                      • Instruction ID: 5693d80790cf9f6f0aebe98693baefe298827946f200eecd013ccc6fdc553585
                                                                      • Opcode Fuzzy Hash: ee1631c23aa7082525ed19512f9bc82bd002a4d07bdbb1c277fde6b9563646c5
                                                                      • Instruction Fuzzy Hash: 700126B14093909AF7204E29ED84B66BFDCEF51374F18C51AED085B24AD37C9840DAB1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.560870364.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_92d000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 97f43dc0da9496ba55870ff2022f66f2be2481e9b73732ca48608b2b72bb750d
                                                                      • Instruction ID: 741bed8659aea4ee7635bfd1fd7d853b22120647801f7660771f1bb35564f8fa
                                                                      • Opcode Fuzzy Hash: 97f43dc0da9496ba55870ff2022f66f2be2481e9b73732ca48608b2b72bb750d
                                                                      • Instruction Fuzzy Hash: B1F0C2B14052849AF7108E16DC84B62FF9CEB91334F18C05AED485B286C37C9844CAB1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.573592396.000000000A990000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A990000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_a990000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 29df180f2b03f537e86d4452562ae906f515e7408091580f83682f99d28b6531
                                                                      • Instruction ID: 4dbdc9a9473de420684c050c64f5bc17e5a735537688e6f66cca123d218a926d
                                                                      • Opcode Fuzzy Hash: 29df180f2b03f537e86d4452562ae906f515e7408091580f83682f99d28b6531
                                                                      • Instruction Fuzzy Hash: 23F049B4E0020AEFEB54DFA9D941AAEBFF1AB48200F004959D525E7201D7308605CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.573592396.000000000A990000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A990000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_a990000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1b5b1134110196487c97d2959b15cd4170d604c37533668e26f94c7ef6dbee74
                                                                      • Instruction ID: 94ae6834bbc86592c4859a83fe7426c888d6e1017d7a23943db57d02d464aaa4
                                                                      • Opcode Fuzzy Hash: 1b5b1134110196487c97d2959b15cd4170d604c37533668e26f94c7ef6dbee74
                                                                      • Instruction Fuzzy Hash: C0F0B7B4E0420AEFDB54DFADD841AAEBFF4AB48300F1045AA9918E7200E77595408FA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.573592396.000000000A990000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A990000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_a990000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 710937221f11f364370c092fde1f364eaf5fea1d87965ec9329f32b5eb4aaea2
                                                                      • Instruction ID: 330d9898f042065cfc6ab7582120729a745b7e55c6ac6638edeb98396cf58345
                                                                      • Opcode Fuzzy Hash: 710937221f11f364370c092fde1f364eaf5fea1d87965ec9329f32b5eb4aaea2
                                                                      • Instruction Fuzzy Hash: 0CE0C231148384AE9F41F760FE00C923FAA6F622803494093FC80CA032D221853CEB62
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 97ef69be472a45b9e8c22d0036926f2f81498684863e025c5597695a7576723c
                                                                      • Instruction ID: a2db89214ad9dcaff1e4d912b93fa1faff8f692a68296347ce73ca2a0bf86fef
                                                                      • Opcode Fuzzy Hash: 97ef69be472a45b9e8c22d0036926f2f81498684863e025c5597695a7576723c
                                                                      • Instruction Fuzzy Hash: 9C12B5F1411F46CAD710CF65FC982897BA1B745328F904308D261ABBF9D7B8214AEF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.561495225.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 54f31efe4eed3888577d5304a6e724fa132e7710d689c4f7de6dd94c7fa9802d
                                                                      • Instruction ID: 5d501d6f2c9d925bc7379e74c7d4998cd75a9b50dd33fcac915250c81526dca4
                                                                      • Opcode Fuzzy Hash: 54f31efe4eed3888577d5304a6e724fa132e7710d689c4f7de6dd94c7fa9802d
                                                                      • Instruction Fuzzy Hash: 2CA17E32E102199FCF05DFA5D8445DEBBB2FF85300B19856AE905AB261EF31A945CBA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d5face214ea57dca86780f2328227a0034e3f12697b505c0e81be485aac41317
                                                                      • Instruction ID: ed40ba21baf80733c3c3c575a137ddc6a1a6693b23f1dab78c8a7672899c9b2b
                                                                      • Opcode Fuzzy Hash: d5face214ea57dca86780f2328227a0034e3f12697b505c0e81be485aac41317
                                                                      • Instruction Fuzzy Hash: 5C512C70E042198BDB18DFA9C9905AEFBF2FF89305F24C1A9C419A7215D735A942CF61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • GetSystemMetrics.USER32(00000005), ref: 04BDD766
                                                                      • GetSystemMetrics.USER32(00000006), ref: 04BDD7A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.570664019.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_4bd0000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: MetricsSystem
                                                                      • String ID: OAB
                                                                      • API String ID: 4116985748-3665554293
                                                                      • Opcode ID: fc9fc9f0f001c83bc88ce6dfe3d6e5831b327ef7477fbb5d5e425fbddf4d0316
                                                                      • Instruction ID: 77d963cde8d7af818f774f2b26b392ab911ad477d6f1480d570c8cba51626610
                                                                      • Opcode Fuzzy Hash: fc9fc9f0f001c83bc88ce6dfe3d6e5831b327ef7477fbb5d5e425fbddf4d0316
                                                                      • Instruction Fuzzy Hash: F12166B5D003488FDB10DFAAC5487DEBFF8EB18314F24819AD549A7690D3B86484CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Execution Graph

                                                                      Execution Coverage:8.8%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:219
                                                                      Total number of Limit Nodes:7
                                                                      execution_graph 31164 4d00040 SetWindowLongW 31165 4d000ac 31164->31165 31184 4d050a0 31185 4d050cd 31184->31185 31198 4d04b68 31185->31198 31187 4d05134 31188 4d04b68 LoadLibraryExW 31187->31188 31189 4d05166 31188->31189 31204 4d04b78 31189->31204 31192 4d04b78 LoadLibraryExW 31193 4d051ca 31192->31193 31208 4d04b88 31193->31208 31196 4d04b88 LoadLibraryExW 31197 4d0522e 31196->31197 31199 4d04b73 31198->31199 31202 d45858 LoadLibraryExW 31199->31202 31203 d47468 LoadLibraryExW 31199->31203 31212 d47170 31199->31212 31200 4d0624b 31200->31187 31202->31200 31203->31200 31205 4d04b83 31204->31205 31225 4d04d00 31205->31225 31207 4d05198 31207->31192 31209 4d04b93 31208->31209 31231 4d0ccf0 31209->31231 31211 4d051fc 31211->31196 31213 d47175 31212->31213 31216 d471c9 31213->31216 31217 d47468 LoadLibraryExW 31213->31217 31214 d4741e 31215 d4745c 31214->31215 31218 d4b330 LoadLibraryExW 31214->31218 31215->31200 31216->31214 31219 4d0dde0 LoadLibraryExW 31216->31219 31220 4d0d7f0 LoadLibraryExW 31216->31220 31221 4d0ddd1 LoadLibraryExW 31216->31221 31222 4d06a27 LoadLibraryExW 31216->31222 31223 4d06a28 LoadLibraryExW 31216->31223 31224 4d0d7ef LoadLibraryExW 31216->31224 31217->31216 31218->31215 31219->31214 31220->31214 31221->31214 31222->31214 31223->31214 31224->31214 31226 4d04d0b 31225->31226 31227 4d070f2 31226->31227 31228 d47170 LoadLibraryExW 31226->31228 31229 d45858 LoadLibraryExW 31226->31229 31230 d47468 LoadLibraryExW 31226->31230 31227->31207 31228->31227 31229->31227 31230->31227 31232 4d0ccfb 31231->31232 31234 d47170 LoadLibraryExW 31232->31234 31235 d45858 LoadLibraryExW 31232->31235 31236 d47468 LoadLibraryExW 31232->31236 31233 4d0dd54 31233->31211 31234->31233 31235->31233 31236->31233 31001 d440d0 31002 d440e2 31001->31002 31003 d440ee 31002->31003 31007 d441e0 31002->31007 31012 d43c64 31003->31012 31005 d4410d 31008 d44205 31007->31008 31016 d442d0 31008->31016 31020 d442e0 31008->31020 31013 d43c6f 31012->31013 31028 d451a4 31013->31028 31015 d46a80 31015->31005 31017 d44307 31016->31017 31018 d443e4 31017->31018 31024 d43de4 31017->31024 31022 d44307 31020->31022 31021 d443e4 31021->31021 31022->31021 31023 d43de4 CreateActCtxA 31022->31023 31023->31021 31025 d45370 CreateActCtxA 31024->31025 31027 d45433 31025->31027 31029 d451af 31028->31029 31032 d457f8 31029->31032 31031 d46b25 31031->31015 31033 d45803 31032->31033 31036 d45828 31033->31036 31035 d46c02 31035->31031 31037 d45833 31036->31037 31040 d45858 31037->31040 31039 d46d02 31039->31035 31041 d45863 31040->31041 31042 d471c9 31041->31042 31053 d47468 31041->31053 31043 d4741e 31042->31043 31065 4d0dde0 31042->31065 31068 4d0d7ef 31042->31068 31071 4d06a28 31042->31071 31075 4d06a27 31042->31075 31079 4d0ddd1 31042->31079 31084 4d0d7f0 31042->31084 31044 d4745c 31043->31044 31087 d4b330 31043->31087 31044->31039 31054 d473fe 31053->31054 31057 d4746b 31053->31057 31055 d4741e 31054->31055 31059 4d0dde0 LoadLibraryExW 31054->31059 31060 4d0d7f0 LoadLibraryExW 31054->31060 31061 4d0ddd1 LoadLibraryExW 31054->31061 31062 4d06a27 LoadLibraryExW 31054->31062 31063 4d06a28 LoadLibraryExW 31054->31063 31064 4d0d7ef LoadLibraryExW 31054->31064 31056 d4745c 31055->31056 31058 d4b330 LoadLibraryExW 31055->31058 31056->31042 31057->31042 31058->31056 31059->31055 31060->31055 31061->31055 31062->31055 31063->31055 31064->31055 31066 4d0ddee 31065->31066 31092 4d0de47 31065->31092 31066->31043 31069 4d0d7ff 31068->31069 31118 4d0d8f7 31068->31118 31069->31043 31072 4d06a36 31071->31072 31073 d492f8 LoadLibraryExW 31071->31073 31074 d49308 LoadLibraryExW 31071->31074 31072->31043 31073->31072 31074->31072 31077 d492f8 LoadLibraryExW 31075->31077 31078 d49308 LoadLibraryExW 31075->31078 31076 4d06a36 31076->31043 31077->31076 31078->31076 31080 4d0ddae 31079->31080 31081 4d0dddf 31079->31081 31080->31043 31083 4d0de47 LoadLibraryExW 31081->31083 31082 4d0ddee 31082->31043 31083->31082 31086 4d0d8f7 LoadLibraryExW 31084->31086 31085 4d0d7ff 31085->31043 31086->31085 31088 d4b361 31087->31088 31089 d4b385 31088->31089 31122 d4b5f8 31088->31122 31126 d4b5e8 31088->31126 31089->31044 31096 d492f8 31092->31096 31101 d49308 31092->31101 31093 4d0de57 31093->31066 31097 d4931b 31096->31097 31098 d4932b 31097->31098 31106 d49998 31097->31106 31110 d49988 31097->31110 31098->31093 31102 d4931b 31101->31102 31103 d4932b 31102->31103 31104 d49998 LoadLibraryExW 31102->31104 31105 d49988 LoadLibraryExW 31102->31105 31103->31093 31104->31103 31105->31103 31107 d499ac 31106->31107 31108 d499d1 31107->31108 31114 d494f8 31107->31114 31108->31098 31111 d499ac 31110->31111 31112 d499d1 31111->31112 31113 d494f8 LoadLibraryExW 31111->31113 31112->31098 31113->31112 31115 d49b78 LoadLibraryExW 31114->31115 31117 d49bf1 31115->31117 31117->31108 31120 d492f8 LoadLibraryExW 31118->31120 31121 d49308 LoadLibraryExW 31118->31121 31119 4d0d90a 31119->31069 31120->31119 31121->31119 31125 d4b605 31122->31125 31123 d4b63f 31123->31089 31125->31123 31130 d497f8 31125->31130 31127 d4b605 31126->31127 31128 d4b63f 31127->31128 31129 d497f8 LoadLibraryExW 31127->31129 31128->31089 31129->31128 31132 d497fd 31130->31132 31131 d4c338 31132->31131 31134 d498c0 31132->31134 31135 d498cb 31134->31135 31136 d45858 LoadLibraryExW 31135->31136 31137 d4c3a7 31135->31137 31136->31137 31141 d4e128 31137->31141 31146 d4e10b 31137->31146 31138 d4c3e0 31138->31131 31143 d4e12a 31141->31143 31142 d4e165 31142->31138 31143->31142 31144 d4e598 LoadLibraryExW 31143->31144 31145 d4e5a8 LoadLibraryExW 31143->31145 31144->31142 31145->31142 31147 d4e119 31146->31147 31148 d4e165 31147->31148 31149 d4e598 LoadLibraryExW 31147->31149 31150 d4e5a8 LoadLibraryExW 31147->31150 31148->31138 31149->31148 31150->31148 31151 d49210 31152 d49212 31151->31152 31154 d492f8 LoadLibraryExW 31152->31154 31155 d49308 LoadLibraryExW 31152->31155 31153 d4921f 31154->31153 31155->31153 31156 d4b710 GetCurrentProcess 31157 d4b783 31156->31157 31158 d4b78a GetCurrentThread 31156->31158 31157->31158 31159 d4b7c7 GetCurrentProcess 31158->31159 31160 d4b7c0 31158->31160 31161 d4b7fd 31159->31161 31160->31159 31162 d4b825 GetCurrentThreadId 31161->31162 31163 d4b856 31162->31163 31166 d498f0 31167 d498f4 GetModuleHandleW 31166->31167 31169 d49965 31167->31169 31170 4d0f1f8 31172 4d0dde0 LoadLibraryExW 31170->31172 31173 4d0ddd1 LoadLibraryExW 31170->31173 31174 4d06a27 LoadLibraryExW 31170->31174 31175 4d06a28 LoadLibraryExW 31170->31175 31171 4d0f242 31172->31171 31173->31171 31174->31171 31175->31171 31237 4d00ca8 31238 4d00cd5 31237->31238 31239 4d00d07 31238->31239 31243 4d00e30 31238->31243 31248 4d00efc 31238->31248 31254 4d00e22 31238->31254 31239->31239 31245 4d00e44 31243->31245 31244 4d00ed0 31244->31239 31259 4d00ed8 31245->31259 31262 4d00ee8 31245->31262 31249 4d00eba 31248->31249 31250 4d00f0a 31248->31250 31252 4d00ed8 CallWindowProcW 31249->31252 31253 4d00ee8 CallWindowProcW 31249->31253 31251 4d00ed0 31251->31239 31252->31251 31253->31251 31256 4d00e44 31254->31256 31255 4d00ed0 31255->31239 31257 4d00ed8 CallWindowProcW 31256->31257 31258 4d00ee8 CallWindowProcW 31256->31258 31257->31255 31258->31255 31260 4d00ef9 31259->31260 31265 4d02381 31259->31265 31260->31244 31263 4d00ef9 31262->31263 31264 4d02381 CallWindowProcW 31262->31264 31263->31244 31264->31263 31266 4d02390 31265->31266 31266->31260 31267 4d0244a CallWindowProcW 31266->31267 31268 4d023f9 31266->31268 31267->31268 31268->31260 31176 d4fd78 31177 d4fde0 CreateWindowExW 31176->31177 31179 d4fe9c 31177->31179 31180 d4b938 DuplicateHandle 31181 d4b9ce 31180->31181 31182 525efc8 FindCloseChangeNotification 31183 525f02f 31182->31183

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D4B770
                                                                      • GetCurrentThread.KERNEL32 ref: 00D4B7AD
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D4B7EA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D4B843
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: 351aad6e54403d0b84b96201abe78f044e290e7d44e6babcbb4971bd9ad73fd2
                                                                      • Instruction ID: 214e752182df4995b40f284e7ae016f5ca4c18ab720c7bcf04e0fedb2380d0ce
                                                                      • Opcode Fuzzy Hash: 351aad6e54403d0b84b96201abe78f044e290e7d44e6babcbb4971bd9ad73fd2
                                                                      • Instruction Fuzzy Hash: 055166B4D002498FDB10CFAAC988BEEBFF1AF48314F24859AE449A7390D7749845CF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D4B770
                                                                      • GetCurrentThread.KERNEL32 ref: 00D4B7AD
                                                                      • GetCurrentProcess.KERNEL32 ref: 00D4B7EA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D4B843
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: 4902209287a0371126ef0a8bfc5b739e31cf00bd5e66cf9efbaff7286203c038
                                                                      • Instruction ID: 854bb4e172dcc19e33c1515d13f9c6df396a2e105270381070e1b0dd80f5913d
                                                                      • Opcode Fuzzy Hash: 4902209287a0371126ef0a8bfc5b739e31cf00bd5e66cf9efbaff7286203c038
                                                                      • Instruction Fuzzy Hash: 795146B4D007498FDB10CFAAC948BAEBBF5BF58314F24855AE409A3350D7749844CF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 38 d4fd6c-d4fdde 39 d4fde0-d4fde6 38->39 40 d4fde9-d4fdf0 38->40 39->40 41 d4fdf2-d4fdf8 40->41 42 d4fdfb-d4fe33 40->42 41->42 43 d4fe3b-d4fe9a CreateWindowExW 42->43 44 d4fea3-d4fedb 43->44 45 d4fe9c-d4fea2 43->45 49 d4fedd-d4fee0 44->49 50 d4fee8 44->50 45->44 49->50 51 d4fee9 50->51 51->51
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D4FE8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: e2e1758cb42aa9f47ac3ddde32cfbafbf572e63b7118d409401e5a9bd800383e
                                                                      • Instruction ID: d94c2f0150aecc53c9305dddd8c0d0eaa47271f491b63d5df67b6003a0994274
                                                                      • Opcode Fuzzy Hash: e2e1758cb42aa9f47ac3ddde32cfbafbf572e63b7118d409401e5a9bd800383e
                                                                      • Instruction Fuzzy Hash: 5C51D2B1D003499FDB14CFA9C884ADEBFB5FF48314F24812AE819AB261D7749845CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 52 d4fd78-d4fdde 53 d4fde0-d4fde6 52->53 54 d4fde9-d4fdf0 52->54 53->54 55 d4fdf2-d4fdf8 54->55 56 d4fdfb-d4fe9a CreateWindowExW 54->56 55->56 58 d4fea3-d4fedb 56->58 59 d4fe9c-d4fea2 56->59 63 d4fedd-d4fee0 58->63 64 d4fee8 58->64 59->58 63->64 65 d4fee9 64->65 65->65
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D4FE8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: a9f172a127d51a85b0349222169d91712dcdcce2daa8592d4fe5c28b03412ec2
                                                                      • Instruction ID: 83edec5b6473e9bafd7cfcdd60c6f31390bf881e1e3cb5ba5e00639e5f372b1f
                                                                      • Opcode Fuzzy Hash: a9f172a127d51a85b0349222169d91712dcdcce2daa8592d4fe5c28b03412ec2
                                                                      • Instruction Fuzzy Hash: 2F41A0B1D103499FDF14CFAAC884ADEBBB5BF48314F24812AE819AB260D7749945CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 66 d45364-d45431 CreateActCtxA 68 d45433-d45439 66->68 69 d4543a-d45494 66->69 68->69 76 d45496-d45499 69->76 77 d454a3-d454a7 69->77 76->77 78 d454b8 77->78 79 d454a9-d454b5 77->79 81 d454b9 78->81 79->78 81->81
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 00D45421
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: d5e385630c9b5c60192eb513cfe7492e7e9288dce54fd023988b0ec2bbcd17b8
                                                                      • Instruction ID: 78282fdafeb95385741105bfff82a2b517935e54f60d2d6d113d19e25c363662
                                                                      • Opcode Fuzzy Hash: d5e385630c9b5c60192eb513cfe7492e7e9288dce54fd023988b0ec2bbcd17b8
                                                                      • Instruction Fuzzy Hash: CE4115B1D00618CFDB24CFA9C884BDDBBB5BF49314F248069D408AB256DB75598ACFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 82 d43de4-d45431 CreateActCtxA 85 d45433-d45439 82->85 86 d4543a-d45494 82->86 85->86 93 d45496-d45499 86->93 94 d454a3-d454a7 86->94 93->94 95 d454b8 94->95 96 d454a9-d454b5 94->96 98 d454b9 95->98 96->95 98->98
                                                                      APIs
                                                                      • CreateActCtxA.KERNEL32(?), ref: 00D45421
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: Create
                                                                      • String ID:
                                                                      • API String ID: 2289755597-0
                                                                      • Opcode ID: 90191fb690173c314cce41c8357ff6aff05865ef14c6f8ce621a4b692a990a76
                                                                      • Instruction ID: 04829a54e8f50f239650409de13030c5e5982110b06d8efb14c0189258eb3a0d
                                                                      • Opcode Fuzzy Hash: 90191fb690173c314cce41c8357ff6aff05865ef14c6f8ce621a4b692a990a76
                                                                      • Instruction Fuzzy Hash: 5041F3B1C00718CBDB24CFA9C884B8EBBB5BF49314F208059D408AB255DB756985CFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 99 4d023b0-4d023ec 100 4d023f2-4d023f7 99->100 101 4d0249c-4d024bc 99->101 102 4d023f9-4d02430 100->102 103 4d0244a-4d02482 CallWindowProcW 100->103 107 4d024bf-4d024cc 101->107 109 4d02432-4d02438 102->109 110 4d02439-4d02448 102->110 105 4d02484-4d0248a 103->105 106 4d0248b-4d0249a 103->106 105->106 106->107 109->110 110->107
                                                                      APIs
                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04D02471
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.588905785.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_4d00000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: CallProcWindow
                                                                      • String ID:
                                                                      • API String ID: 2714655100-0
                                                                      • Opcode ID: ef00511505aa358b969c397c51709ef6090a207085c63b714b9ad94e3892dc63
                                                                      • Instruction ID: 4cecc2ac1c6155396002dff3bad8495b71b94ce5806946e92ce091ed951572e7
                                                                      • Opcode Fuzzy Hash: ef00511505aa358b969c397c51709ef6090a207085c63b714b9ad94e3892dc63
                                                                      • Instruction Fuzzy Hash: 6D411AB4A003458FCB14CF99C488BAABBF5FF98314F25C599E519A7361D774E841CBA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 113 d49b72-d49b75 114 d49b77-d49bb8 113->114 115 d49b0b-d49b2d 113->115 116 d49bc0-d49bef LoadLibraryExW 114->116 117 d49bba-d49bbd 114->117 121 d49b3d 115->121 122 d49b2f-d49b33 115->122 119 d49bf1-d49bf7 116->119 120 d49bf8-d49c15 116->120 117->116 119->120 126 d49b3e 121->126 122->121 123 d49b35 122->123 123->121 126->126
                                                                      APIs
                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D499D1,00000800,00000000,00000000), ref: 00D49BE2
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 64bfc448ffa1f89f33f047242cced85146e03bda2a390110a6e23eec5f89dbb6
                                                                      • Instruction ID: b1c5e673e19f3ecb3be537c98d4b23e931ab46b4649dc81ad88d3b8f17cf9caa
                                                                      • Opcode Fuzzy Hash: 64bfc448ffa1f89f33f047242cced85146e03bda2a390110a6e23eec5f89dbb6
                                                                      • Instruction Fuzzy Hash: 122127B2D00249CFCB20CF9AD494AEEFBB4EB98324F14842AD455B7640C7789949CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 127 d4b932-d4b9cc DuplicateHandle 128 d4b9d5-d4b9f2 127->128 129 d4b9ce-d4b9d4 127->129 129->128
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D4B9BF
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: bb7ae10340bc7fe2be3710680e0b83b2d5853b37352f47e38b4a1692a3cb09f3
                                                                      • Instruction ID: 043e4d8d2dd5bd495efb1e0192a23b2c90b050badb080759750fe25033c4909d
                                                                      • Opcode Fuzzy Hash: bb7ae10340bc7fe2be3710680e0b83b2d5853b37352f47e38b4a1692a3cb09f3
                                                                      • Instruction Fuzzy Hash: 0A2116B59002599FCB10CFA9D884AEEBFF4EF58324F14801AE954A3310C378A945CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 132 d4b938-d4b9cc DuplicateHandle 133 d4b9d5-d4b9f2 132->133 134 d4b9ce-d4b9d4 132->134 134->133
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D4B9BF
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: 87d9ded9f0820e2bd20721892434312973ce3fa866fb5fd2635387bb2e2a0d2f
                                                                      • Instruction ID: 54ed55708e96cd61a89ef47018a5730573ea0ee63f5947272467c29e2a57957d
                                                                      • Opcode Fuzzy Hash: 87d9ded9f0820e2bd20721892434312973ce3fa866fb5fd2635387bb2e2a0d2f
                                                                      • Instruction Fuzzy Hash: F821E4B59002189FDB10CF9AD984ADEBFF8EB58324F14841AE954A3310D378A944CFA4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 137 d49882-d49894 138 d498f4-d49930 137->138 139 d49896-d498b8 137->139 141 d49932-d49935 138->141 142 d49938-d49963 GetModuleHandleW 138->142 139->138 141->142 143 d49965-d4996b 142->143 144 d4996c-d49980 142->144 143->144
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00D49956
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: bac2fa0290b0b62ba9bd236c35ecfe75f2619371fedbf1379ab80cce1592b3cf
                                                                      • Instruction ID: 4e42b5257a3f266373b509683de3e103b6c6a1d1728fb9f49b57b08de7f91347
                                                                      • Opcode Fuzzy Hash: bac2fa0290b0b62ba9bd236c35ecfe75f2619371fedbf1379ab80cce1592b3cf
                                                                      • Instruction Fuzzy Hash: 2E2157B2C043898FCB11CFAAC4846DEFBB0EF4A324F19809AD495A7651C3789546CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 146 d494f8-d49bb8 148 d49bc0-d49bef LoadLibraryExW 146->148 149 d49bba-d49bbd 146->149 150 d49bf1-d49bf7 148->150 151 d49bf8-d49c15 148->151 149->148 150->151
                                                                      APIs
                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D499D1,00000800,00000000,00000000), ref: 00D49BE2
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: e2f52e849e227edf9f8adf2904bcd0f3954d61a1a5519d1f5c364d5b0647c28b
                                                                      • Instruction ID: 8032b7673ae1653ad40ecdf214266af5d9fcb8605a639d497e88b48872e75db5
                                                                      • Opcode Fuzzy Hash: e2f52e849e227edf9f8adf2904bcd0f3954d61a1a5519d1f5c364d5b0647c28b
                                                                      • Instruction Fuzzy Hash: F31117B69003099FCB10CF9AD484ADFFBF8EB98324F14852EE455A7600C774A945CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 154 d498e8-d49930 156 d49932-d49935 154->156 157 d49938-d49963 GetModuleHandleW 154->157 156->157 158 d49965-d4996b 157->158 159 d4996c-d49980 157->159 158->159
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00D49956
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: 2a9fb51a994a0a1fcee9b78c2991dceade58a4876230cae10475b919b5e5a600
                                                                      • Instruction ID: 2c7cc3883b3174dc5f59ab7581199877ce04ea4c58833f6a07b103f0f293e803
                                                                      • Opcode Fuzzy Hash: 2a9fb51a994a0a1fcee9b78c2991dceade58a4876230cae10475b919b5e5a600
                                                                      • Instruction Fuzzy Hash: BD11F3B5D006498FCB20CF9AC444ADEFBF5AF89324F14846AD869B7610D378A546CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 168 525efc8-525f02d FindCloseChangeNotification 169 525f036-525f05e 168->169 170 525f02f-525f035 168->170 170->169
                                                                      APIs
                                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0525F020
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.590227087.0000000005250000.00000040.00000800.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_5250000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: ChangeCloseFindNotification
                                                                      • String ID:
                                                                      • API String ID: 2591292051-0
                                                                      • Opcode ID: 7fa509660196ba6bdc55da308bb15a757fede32696da2f776429784af7846e57
                                                                      • Instruction ID: 25244c0c6aa75c9789da36ca51cabd336615398ce16cba8cad5797206d19a81d
                                                                      • Opcode Fuzzy Hash: 7fa509660196ba6bdc55da308bb15a757fede32696da2f776429784af7846e57
                                                                      • Instruction Fuzzy Hash: B31148B18003098FCB20CF9AC544BDEBBF4EF58324F14841AD858A7740D778A544CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 161 d498f0-d49930 163 d49932-d49935 161->163 164 d49938-d49963 GetModuleHandleW 161->164 163->164 165 d49965-d4996b 164->165 166 d4996c-d49980 164->166 165->166
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00D49956
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.583440212.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_d40000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: e2dece89ca9c4a3f89dfe2c055a70178157f1697ceddc1c65547e7f264a5f1f7
                                                                      • Instruction ID: 0d666b278fde7e791eb0f972cc55d4fa0726a06a949c151ec1cd4c1c5e0b5a02
                                                                      • Opcode Fuzzy Hash: e2dece89ca9c4a3f89dfe2c055a70178157f1697ceddc1c65547e7f264a5f1f7
                                                                      • Instruction Fuzzy Hash: 5911D2B6D006498FCB20CF9AC444ADEFBF8AB88324F14851AD859B7600D378A545CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 04D0009D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.588905785.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_4d00000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: 848f5d4292de2ec7c8332c711b03ea20e7120aa1487b2fd00a5d91e0572aa3ae
                                                                      • Instruction ID: a603e528266a89952ffbb33dc7adc0b35cbc6d818ba98660430d81a40483957e
                                                                      • Opcode Fuzzy Hash: 848f5d4292de2ec7c8332c711b03ea20e7120aa1487b2fd00a5d91e0572aa3ae
                                                                      • Instruction Fuzzy Hash: 4211E5B59003099FDB20DF9AD584BDEBBF8EB58324F20851AD955B7740C378A944CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 04D0009D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.588905785.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_4d00000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: 575edf1bbe0c88360b55ac00a43727de28c1a368436bfe32149e5a156c85ce57
                                                                      • Instruction ID: d0771a29567bf7a7df94e3738071c5077ab0ff6badafe195dcd89b3dcbdbc757
                                                                      • Opcode Fuzzy Hash: 575edf1bbe0c88360b55ac00a43727de28c1a368436bfe32149e5a156c85ce57
                                                                      • Instruction Fuzzy Hash: A511E5B59002099FDB20DF9AD584BDEBBF8EB58324F20851AD959B7740C378A944CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.590227087.0000000005250000.00000040.00000800.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_5250000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (
                                                                      • API String ID: 0-3887548279
                                                                      • Opcode ID: 64e89efef8e8d193c93cb4b80c389865946cb1c47397b2eca00ed694d96e4832
                                                                      • Instruction ID: 762bb8dc95edd0047911053009d329fbcd9e201a81ae0a4485342020b9771dce
                                                                      • Opcode Fuzzy Hash: 64e89efef8e8d193c93cb4b80c389865946cb1c47397b2eca00ed694d96e4832
                                                                      • Instruction Fuzzy Hash: 6162D475A002288FDB64DF69C944BDDBBB2FF89304F1481EAD409AB295DB309E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Execution Graph

                                                                      Execution Coverage:21.5%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:65
                                                                      Total number of Limit Nodes:3
                                                                      execution_graph 5345 6182d58 5346 6182d61 5345->5346 5350 6182d98 5346->5350 5360 6182da8 5346->5360 5347 6182d92 5352 6182da2 5350->5352 5353 6182dfe 5350->5353 5351 6182e26 5351->5347 5355 6182d98 DnsQuery_A 5352->5355 5366 6182dd0 5352->5366 5371 6182de0 5352->5371 5353->5351 5376 6182ee8 5353->5376 5380 6182ed9 5353->5380 5354 6182dc4 5354->5347 5355->5354 5361 6182dad 5360->5361 5363 6182d98 DnsQuery_A 5361->5363 5364 6182dd0 DnsQuery_A 5361->5364 5365 6182de0 DnsQuery_A 5361->5365 5362 6182dc4 5362->5347 5363->5362 5364->5362 5365->5362 5367 6182dfe 5366->5367 5368 6182e26 5367->5368 5369 6182ee8 DnsQuery_A 5367->5369 5370 6182ed9 DnsQuery_A 5367->5370 5368->5354 5369->5367 5370->5367 5373 6182dfe 5371->5373 5372 6182e26 5372->5354 5373->5372 5374 6182ee8 DnsQuery_A 5373->5374 5375 6182ed9 DnsQuery_A 5373->5375 5374->5373 5375->5373 5377 6182f11 5376->5377 5384 6181534 5377->5384 5381 6182ee8 5380->5381 5382 6181534 DnsQuery_A 5381->5382 5383 6182f52 5382->5383 5383->5353 5385 61831f8 DnsQuery_A 5384->5385 5387 6183332 5385->5387 5409 6182d4a 5410 6182d58 5409->5410 5412 6182d98 DnsQuery_A 5410->5412 5413 6182da8 DnsQuery_A 5410->5413 5411 6182d92 5412->5411 5413->5411 5428 61831ec 5429 61831f8 DnsQuery_A 5428->5429 5431 6183332 5429->5431 5388 6180ef0 5389 6180f43 5388->5389 5390 6180faf GetCurrentThreadId 5389->5390 5391 6180f7f 5389->5391 5390->5391 5391->5391 5414 6183140 5415 618315e 5414->5415 5417 6183172 5414->5417 5416 61831b0 5417->5416 5418 61832df DnsQuery_A 5417->5418 5419 6183332 5418->5419 5420 6186b90 5421 6186ba0 5420->5421 5422 6186c14 GetCurrentThreadId 5421->5422 5423 6186c3c 5421->5423 5422->5423 5392 6180ee1 5393 6180f43 5392->5393 5394 6180faf GetCurrentThreadId 5393->5394 5395 6180f7f 5393->5395 5394->5395 5400 6183131 5402 6183140 5400->5402 5401 618315e 5402->5401 5403 61832df DnsQuery_A 5402->5403 5404 6183332 5403->5404

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 6183140-618315c 1 618315e-618316f 0->1 2 6183172-61831d3 0->2 11 61831b0-61831df 2->11 12 61831e1-618326b 2->12 19 618326d-6183277 12->19 20 61832a4-61832d7 12->20 19->20 22 6183279-618327b 19->22 28 61832df-6183330 DnsQuery_A 20->28 23 618327d-6183287 22->23 24 618329e-61832a1 22->24 26 6183289 23->26 27 618328b-618329a 23->27 24->20 26->27 27->27 29 618329c 27->29 30 6183339-6183386 28->30 31 6183332-6183338 28->31 29->24 36 6183388-618338c 30->36 37 6183396-618339a 30->37 31->30 36->37 38 618338e 36->38 39 61833a9-61833ad 37->39 40 618339c-618339f 37->40 38->37 41 61833be 39->41 42 61833af-61833bb 39->42 40->39 44 61833bf 41->44 42->41 44->44
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.815459900.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_6180000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8630399689487fbc384fe7671301bd59bab85f65c60769e1f727732c3ab20d24
                                                                      • Instruction ID: 2e617506c35c029ba4c001e638ea7594d13fdedaeb0085555b45c00c487c22bd
                                                                      • Opcode Fuzzy Hash: 8630399689487fbc384fe7671301bd59bab85f65c60769e1f727732c3ab20d24
                                                                      • Instruction Fuzzy Hash: 328158B1D00219DFDB54DFA9C8846DEFBB1FF48710F24852AD825AB240DB74A946CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 45 61831ec-618326b 48 618326d-6183277 45->48 49 61832a4-61832d7 45->49 48->49 50 6183279-618327b 48->50 56 61832df-6183330 DnsQuery_A 49->56 51 618327d-6183287 50->51 52 618329e-61832a1 50->52 54 6183289 51->54 55 618328b-618329a 51->55 52->49 54->55 55->55 57 618329c 55->57 58 6183339-6183386 56->58 59 6183332-6183338 56->59 57->52 64 6183388-618338c 58->64 65 6183396-618339a 58->65 59->58 64->65 66 618338e 64->66 67 61833a9-61833ad 65->67 68 618339c-618339f 65->68 66->65 69 61833be 67->69 70 61833af-61833bb 67->70 68->67 72 61833bf 69->72 70->69 72->72
                                                                      APIs
                                                                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06183320
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.815459900.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_6180000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: Query_
                                                                      • String ID:
                                                                      • API String ID: 428220571-0
                                                                      • Opcode ID: f37d55273c875408b8549a4ecce7cd5e67c86397122297f775cfb9501ef4a272
                                                                      • Instruction ID: 72761924eb0849823ef22e459fbfb8f1bfa5e43fbe78437fffbb69dd0e867147
                                                                      • Opcode Fuzzy Hash: f37d55273c875408b8549a4ecce7cd5e67c86397122297f775cfb9501ef4a272
                                                                      • Instruction Fuzzy Hash: A75113B1D002589FCB54DFA9C884ADEBBB1FF48714F24812AE814BB240DB74A946CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 73 6181534-618326b 76 618326d-6183277 73->76 77 61832a4-6183330 DnsQuery_A 73->77 76->77 78 6183279-618327b 76->78 86 6183339-6183386 77->86 87 6183332-6183338 77->87 79 618327d-6183287 78->79 80 618329e-61832a1 78->80 82 6183289 79->82 83 618328b-618329a 79->83 80->77 82->83 83->83 85 618329c 83->85 85->80 92 6183388-618338c 86->92 93 6183396-618339a 86->93 87->86 92->93 94 618338e 92->94 95 61833a9-61833ad 93->95 96 618339c-618339f 93->96 94->93 97 61833be 95->97 98 61833af-61833bb 95->98 96->95 100 61833bf 97->100 98->97 100->100
                                                                      APIs
                                                                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06183320
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.815459900.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_6180000_CgpIx13Spu.jbxd
                                                                      Similarity
                                                                      • API ID: Query_
                                                                      • String ID:
                                                                      • API String ID: 428220571-0
                                                                      • Opcode ID: 391de397b31d76ae9ade67cd954579907530bb3c0fd90e433ee0b0bd7251e300
                                                                      • Instruction ID: 8eaef2007e9d24c26118f9fbadfb2248a4866a73aed308b04fc400d32c417041
                                                                      • Opcode Fuzzy Hash: 391de397b31d76ae9ade67cd954579907530bb3c0fd90e433ee0b0bd7251e300
                                                                      • Instruction Fuzzy Hash: A35113B1D0025D9FCB54DFA9C884ADEBBB1FF48714F24852AE814BB240DB74A945CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Execution Graph

                                                                      Execution Coverage:10.3%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:82
                                                                      Total number of Limit Nodes:7
                                                                      execution_graph 14410 291bdc1 14411 291bd62 DuplicateHandle 14410->14411 14413 291bdcf 14410->14413 14412 291bd96 14411->14412 14317 291b6d0 GetCurrentProcess 14318 291b743 14317->14318 14319 291b74a GetCurrentThread 14317->14319 14318->14319 14320 291b780 14319->14320 14321 291b787 GetCurrentProcess 14319->14321 14320->14321 14322 291b7bd 14321->14322 14323 291b7e5 GetCurrentThreadId 14322->14323 14324 291b816 14323->14324 14325 29192f0 14328 29193e8 14325->14328 14326 29192ff 14329 29193fb 14328->14329 14330 2919413 14329->14330 14336 2919670 14329->14336 14340 2919660 14329->14340 14330->14326 14331 291940b 14331->14330 14332 2919610 GetModuleHandleW 14331->14332 14333 291963d 14332->14333 14333->14326 14337 2919684 14336->14337 14338 29196a9 14337->14338 14344 2918768 14337->14344 14338->14331 14341 2919670 14340->14341 14342 29196a9 14341->14342 14343 2918768 LoadLibraryExW 14341->14343 14342->14331 14343->14342 14345 2919850 LoadLibraryExW 14344->14345 14347 29198c9 14345->14347 14347->14338 14414 291fe40 SetWindowLongW 14415 291feac 14414->14415 14348 2916758 14351 2916344 14348->14351 14350 2916766 14352 291634f 14351->14352 14355 2916394 14352->14355 14354 291688d 14354->14350 14356 291639f 14355->14356 14359 29163c4 14356->14359 14358 2916962 14358->14354 14360 29163cf 14359->14360 14363 29163f4 14360->14363 14362 2916a62 14362->14358 14365 29163ff 14363->14365 14364 29171bc 14364->14362 14365->14364 14367 291b406 14365->14367 14368 291b429 14367->14368 14369 291b44d 14368->14369 14372 291b5a9 14368->14372 14376 291b5b8 14368->14376 14369->14364 14373 291b5c5 14372->14373 14375 291b5ff 14373->14375 14380 291a0ec 14373->14380 14375->14369 14377 291b5c5 14376->14377 14378 291a0ec 6 API calls 14377->14378 14379 291b5ff 14377->14379 14378->14379 14379->14369 14381 291a0f7 14380->14381 14382 291c2f8 14381->14382 14384 291b904 14381->14384 14385 291b90f 14384->14385 14386 291c367 14385->14386 14387 29163f4 6 API calls 14385->14387 14394 291c3d1 14386->14394 14400 291c3e0 14386->14400 14387->14386 14388 291c375 14392 291e0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 14388->14392 14393 291e0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW 14388->14393 14389 291c3a0 14389->14382 14392->14389 14393->14389 14396 291c40e 14394->14396 14395 291c437 14398 291c4da KiUserCallbackDispatcher 14395->14398 14399 291c4df 14395->14399 14396->14395 14396->14399 14406 291b9a0 14396->14406 14398->14399 14401 291c40e 14400->14401 14402 291b9a0 GetFocus 14401->14402 14403 291c437 14401->14403 14405 291c4df 14401->14405 14402->14403 14404 291c4da KiUserCallbackDispatcher 14403->14404 14403->14405 14404->14405 14407 291b9ab 14406->14407 14408 291ba14 GetFocus 14407->14408 14409 291c9f5 14407->14409 14408->14409 14409->14395

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 0291B730
                                                                      • GetCurrentThread.KERNEL32 ref: 0291B76D
                                                                      • GetCurrentProcess.KERNEL32 ref: 0291B7AA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0291B803
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: b07ead63e059899287101896162f6c0535c336d1d01219745ea923e783b9267b
                                                                      • Instruction ID: f7aac8030167b11a7cefe29ae7fdba3d8a2f599937513bb6796faaa79d67f9f5
                                                                      • Opcode Fuzzy Hash: b07ead63e059899287101896162f6c0535c336d1d01219745ea923e783b9267b
                                                                      • Instruction Fuzzy Hash: E55165B4D003488FDB10CFAAC6887DEBFF6AF48318F20859AE049A7750D7785944CB65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 0291B730
                                                                      • GetCurrentThread.KERNEL32 ref: 0291B76D
                                                                      • GetCurrentProcess.KERNEL32 ref: 0291B7AA
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0291B803
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: 47472b3478611c123eca558a75d693242c1d3d274448a963abae1d5c1ec5cb95
                                                                      • Instruction ID: 342bb2af96a1c53491aaa254734530d5c9d458219dc5fa9cd1e74b30ab6bce33
                                                                      • Opcode Fuzzy Hash: 47472b3478611c123eca558a75d693242c1d3d274448a963abae1d5c1ec5cb95
                                                                      • Instruction Fuzzy Hash: 365156B4E007488FDB10CFAAD6487DEBBF5AF48318F208459E059A7750D7745984CF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 38 291faa0-291fb88 39 291fb8a-291fbd8 call 291da04 38->39 40 291fbec-291fc5e 38->40 44 291fbdd-291fbde 39->44 42 291fc60-291fc66 40->42 43 291fc69-291fc70 40->43 42->43 45 291fc72-291fc78 43->45 46 291fc7b-291fd1a CreateWindowExW 43->46 45->46 48 291fd23-291fd5b 46->48 49 291fd1c-291fd22 46->49 53 291fd68 48->53 54 291fd5d-291fd60 48->54 49->48 55 291fd69 53->55 54->53 55->55
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0291FD0A
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: 444928cad05dbc82c1ca46ad0a22611714ac2a022a98d27b3489cd026239926a
                                                                      • Instruction ID: 720c3a1483fc6a09e0590f0192e497e1c9df2c8511f7e467e841f34bf547e687
                                                                      • Opcode Fuzzy Hash: 444928cad05dbc82c1ca46ad0a22611714ac2a022a98d27b3489cd026239926a
                                                                      • Instruction Fuzzy Hash: 77915E718083889FDB02CFA5C8919DDBFB1FF4A314F1981AAE8449B263D335955ACF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 56 29193e8-29193fd call 2918704 59 2919413-2919417 56->59 60 29193ff 56->60 61 2919419-2919423 59->61 62 291942b-291946c 59->62 109 2919405 call 2919670 60->109 110 2919405 call 2919660 60->110 61->62 67 2919479-2919487 62->67 68 291946e-2919476 62->68 63 291940b-291940d 63->59 64 2919548-2919608 63->64 104 2919610-291963b GetModuleHandleW 64->104 105 291960a-291960d 64->105 70 2919489-291948e 67->70 71 29194ab-29194ad 67->71 68->67 73 2919490-2919497 call 2918710 70->73 74 2919499 70->74 72 29194b0-29194b7 71->72 77 29194c4-29194cb 72->77 78 29194b9-29194c1 72->78 76 291949b-29194a9 73->76 74->76 76->72 81 29194d8-29194e1 call 2918720 77->81 82 29194cd-29194d5 77->82 78->77 87 29194e3-29194eb 81->87 88 29194ee-29194f3 81->88 82->81 87->88 89 2919511-2919515 88->89 90 29194f5-29194fc 88->90 111 2919518 call 2919958 89->111 112 2919518 call 2919968 89->112 90->89 92 29194fe-291950e call 2918730 call 2918740 90->92 92->89 94 291951b-291951e 97 2919541-2919547 94->97 98 2919520-291953e 94->98 98->97 106 2919644-2919658 104->106 107 291963d-2919643 104->107 105->104 107->106 109->63 110->63 111->94 112->94
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0291962E
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: 7677927de616792c8d8ecfadf2ade470739cca3a8087251c5b79c776ed09e730
                                                                      • Instruction ID: 6c03959a1fd90c7e8f84a0dcecd4395a37bbe282e6f332ab2c3c5ef2e4843140
                                                                      • Opcode Fuzzy Hash: 7677927de616792c8d8ecfadf2ade470739cca3a8087251c5b79c776ed09e730
                                                                      • Instruction Fuzzy Hash: C2711470A00B098FE764DF2AD45175ABBF5BF88314F008A2ED48AD7A90D734E945CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 113 291fbf8-291fc5e 114 291fc60-291fc66 113->114 115 291fc69-291fc70 113->115 114->115 116 291fc72-291fc78 115->116 117 291fc7b-291fcb3 115->117 116->117 118 291fcbb-291fd1a CreateWindowExW 117->118 119 291fd23-291fd5b 118->119 120 291fd1c-291fd22 118->120 124 291fd68 119->124 125 291fd5d-291fd60 119->125 120->119 126 291fd69 124->126 125->124 126->126
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0291FD0A
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: a698d0ed1057025d6c5c8d444538fb79daa6471276e6376c420923e9066a96bc
                                                                      • Instruction ID: 8a858695c9e5947078a93f3b309fab539beb8358792a8af2fca2d9301c1a34b4
                                                                      • Opcode Fuzzy Hash: a698d0ed1057025d6c5c8d444538fb79daa6471276e6376c420923e9066a96bc
                                                                      • Instruction Fuzzy Hash: 9D41C0B5D0030D9FDF14CFAAC984ADEBBB5BF48314F24812AE819AB210D774A945CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 127 291bdc1-291bdcd 128 291bd62-291bd94 DuplicateHandle 127->128 129 291bdcf-291bddb 127->129 130 291bd96-291bd9c 128->130 131 291bd9d-291bdba 128->131 132 291bde6-291beee 129->132 130->131
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0291BD87
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: 3144beab84f5b7bf443dbeff78e0cd7e391f4fdcfaca0f94068e2a2401790cc8
                                                                      • Instruction ID: e3cd3c4550cb95296fb6576fb170374c26a1d38873a09cce82f4948f831981a9
                                                                      • Opcode Fuzzy Hash: 3144beab84f5b7bf443dbeff78e0cd7e391f4fdcfaca0f94068e2a2401790cc8
                                                                      • Instruction Fuzzy Hash: A3417C78E44744DFE7419F71E544BAA7FB6EB98702F104629EA418B3CAE7780881CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 145 291bcf9-291bd60 146 291bd62-291bd94 DuplicateHandle 145->146 147 291bd96-291bd9c 146->147 148 291bd9d-291bdba 146->148 147->148
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0291BD87
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: b3e77d7fc5eb94429dddb9ea06f53fda4c43c1ff412fac20fcba967dbe88a956
                                                                      • Instruction ID: 555f90aa565967041dc6f3d8d30613de0be593c269c0c1a6989e106415983bd2
                                                                      • Opcode Fuzzy Hash: b3e77d7fc5eb94429dddb9ea06f53fda4c43c1ff412fac20fcba967dbe88a956
                                                                      • Instruction Fuzzy Hash: E621E5B59002189FDB10CF9AD584ADEBFF9EF58324F14805AE958A7310D378A945CFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 151 291bd00-291bd60 152 291bd62-291bd94 DuplicateHandle 151->152 153 291bd96-291bd9c 152->153 154 291bd9d-291bdba 152->154 153->154
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0291BD87
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: f620dde8dd3508ed26bc3b505d68875bf43d4f93c0fab630423e5a7609a36998
                                                                      • Instruction ID: e8ea5b1aff493d55412be44d56436e135acde4f698d5db7d54b62740b6475381
                                                                      • Opcode Fuzzy Hash: f620dde8dd3508ed26bc3b505d68875bf43d4f93c0fab630423e5a7609a36998
                                                                      • Instruction Fuzzy Hash: 4B21C6B59002189FDB10CF9AD584ADEBFF9FF48324F14845AE954A3310D378A944CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 157 2919849-2919890 158 2919892-2919895 157->158 159 2919898-29198c7 LoadLibraryExW 157->159 158->159 160 29198d0-29198ed 159->160 161 29198c9-29198cf 159->161 161->160
                                                                      APIs
                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,029196A9,00000800,00000000,00000000), ref: 029198BA
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: c011aaad13715c837e3edcbf92f5b623dbb943deaee9b99ac3a7b197091a8db8
                                                                      • Instruction ID: 854509c74dda5b6d6f2d799af0123bf29f95c3a6ba624537d773f8ba2c9fab1f
                                                                      • Opcode Fuzzy Hash: c011aaad13715c837e3edcbf92f5b623dbb943deaee9b99ac3a7b197091a8db8
                                                                      • Instruction Fuzzy Hash: 6E1114B6D002098FDB10CF9AD444BDEFBF8EF58324F14856AD419A7600C379A546CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 164 2918768-2919890 166 2919892-2919895 164->166 167 2919898-29198c7 LoadLibraryExW 164->167 166->167 168 29198d0-29198ed 167->168 169 29198c9-29198cf 167->169 169->168
                                                                      APIs
                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,029196A9,00000800,00000000,00000000), ref: 029198BA
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 84b2f67068051dfba64c49b03a76a1c9b47be3d787ec88cca86929e1f57179a1
                                                                      • Instruction ID: 4a050432f7fc8c13c02a0954c5c775e24339f22ca6b3cd91ce9c4d9b55c75075
                                                                      • Opcode Fuzzy Hash: 84b2f67068051dfba64c49b03a76a1c9b47be3d787ec88cca86929e1f57179a1
                                                                      • Instruction Fuzzy Hash: 301100B6D002098FDB10CF9AC444BDEBBF8EB88324F14846AE519A7600C379A945CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 172 291fe38-291feaa SetWindowLongW 173 291feb3-291fec7 172->173 174 291feac-291feb2 172->174 174->173
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 0291FE9D
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: ee8bc4905ff9baaed3161b8cddfb9324da682234fb1cdfb08dcc90bbfd443e64
                                                                      • Instruction ID: 42340fb9a5673c85c4e15bd6a8acd190fe06cc74d7e911ee18cc7eb1851f3ffb
                                                                      • Opcode Fuzzy Hash: ee8bc4905ff9baaed3161b8cddfb9324da682234fb1cdfb08dcc90bbfd443e64
                                                                      • Instruction Fuzzy Hash: FA11F5B59002088FDB10CF9AD585BDEBBF8EB48324F20855AD859A7600D379A945CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 176 29195c8-2919608 177 2919610-291963b GetModuleHandleW 176->177 178 291960a-291960d 176->178 179 2919644-2919658 177->179 180 291963d-2919643 177->180 178->177 180->179
                                                                      APIs
                                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0291962E
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: 33651e1601f6bc5c17eee60a42f2a9f7faf55e15dae9747aabf2db7907aaca64
                                                                      • Instruction ID: 63e01f4799753ce8bfdeba3e8c40601c0ace8bb44647b608621c0f651d5e537b
                                                                      • Opcode Fuzzy Hash: 33651e1601f6bc5c17eee60a42f2a9f7faf55e15dae9747aabf2db7907aaca64
                                                                      • Instruction Fuzzy Hash: 081110B6D002498FDB10CF9AC544BDEFBF8EF88328F10842AD419A7600D378A545CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 182 291fe40-291feaa SetWindowLongW 183 291feb3-291fec7 182->183 184 291feac-291feb2 182->184 184->183
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?), ref: 0291FE9D
                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.599295647.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_2910000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: d7a1e66db3258c02a777e8149aee31a28832101677d044adc663400d4326e98b
                                                                      • Instruction ID: c79dd54b7bee126e8f9562f61764361985816e6a46ce675472d400f9972317c0
                                                                      • Opcode Fuzzy Hash: d7a1e66db3258c02a777e8149aee31a28832101677d044adc663400d4326e98b
                                                                      • Instruction Fuzzy Hash: 981100B59003088FDB10CF9AD584BDEBBF8EB48324F20845AE818A3600C378A944CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.598051271.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_f1d000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e675524c3e4880b33e55a881d166fe7dc4c58619a8a1d1122da1d9d5d4a08631
                                                                      • Instruction ID: b2d74be2c19d7fc4e4a28f8c136fb1b1406727920916660388bf43d96a7b948d
                                                                      • Opcode Fuzzy Hash: e675524c3e4880b33e55a881d166fe7dc4c58619a8a1d1122da1d9d5d4a08631
                                                                      • Instruction Fuzzy Hash: 28212876904244DFDB05DF14D9C0B66BF76FB94328F24C569E9050B216C33AD885EBA2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.598252939.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_f2d000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e7be54a3ac556ee265e633405726bea3b37e8924b6dd97d599af680b0a2543f2
                                                                      • Instruction ID: 2f514bed80c2e681beae0a32d69c1244c9945f2da6fb25d120b7fe318271f313
                                                                      • Opcode Fuzzy Hash: e7be54a3ac556ee265e633405726bea3b37e8924b6dd97d599af680b0a2543f2
                                                                      • Instruction Fuzzy Hash: C6213775904240DFCB14CF14E4C0B16BF65FB84324F20C56DE84A0B25AC33AD807EA61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.598252939.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_f2d000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2b012a32e9ec437d99b787fe168816c5e48636b8d4e104db72f6c3ca28dd26fe
                                                                      • Instruction ID: 42994c074ada41d0e9f5b8cce126d4c6ceaa6f9404f2945a3ba43ec4a012323c
                                                                      • Opcode Fuzzy Hash: 2b012a32e9ec437d99b787fe168816c5e48636b8d4e104db72f6c3ca28dd26fe
                                                                      • Instruction Fuzzy Hash: D22183755093C08FC712CF24D590715BF71EB46324F28C5EAD8498B667C33A980ADB62
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 0000000F.00000002.598051271.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_15_2_f1d000_unFmnPEZpvL.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                                                      • Instruction ID: fb59d89378edc09ba79552bb07595a82caca0dc507bae480c15939f5085912cc
                                                                      • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                                                      • Instruction Fuzzy Hash: AF110376804280CFCB12CF04D5C0B56BF72FB84324F28C2A9D8050B616C33AD896DBA2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%