owe, wieder aviara... und box war mir noch nie geheuer.... Code:
2014-11-20 09:41:29,948 - detector - INFO - Starting with process ID 5628
2014-11-20 09:41:29,948 - detector - ERROR - The user is not an Administrator, aborting
2014-11-20 09:42:31,293 - detector - INFO - Starting with process ID 6148
2014-11-20 09:42:31,299 - detector - INFO - Selected Profile Name: Win7SP1x64
2014-11-20 09:42:31,299 - detector - INFO - Selected Driver: C:\Users\Admin\AppData\Local\Temp\_MEI65162\drivers\winpmem64.sys
2014-11-20 09:42:31,301 - detector.service - INFO - Launching service destroyer...
2014-11-20 09:42:31,345 - detector.service - DEBUG - Unable to OpenService: (1060, 'OpenService', 'Der angegebene Dienst ist kein installierter Dienst.')
2014-11-20 09:42:31,345 - detector.service - INFO - Trying to stop the winpmem service...
2014-11-20 09:42:31,345 - detector.service - INFO - Trying to delete the winpmem service...
2014-11-20 09:42:31,346 - detector.service - DEBUG - Unable to delete the service: (6, 'DeleteService', 'Das Handle ist ung\xfcltig.')
2014-11-20 09:42:31,364 - detector.service - INFO - Trying to start the winpmem service...
2014-11-20 09:42:31,380 - detector - INFO - Service started
2014-11-20 09:42:31,380 - detector - INFO - Selected Yara signature file at C:\Users\Admin\AppData\Local\Temp\_MEI65162\rules\signatures.yar
2014-11-20 09:42:31,381 - detector - INFO - Obtaining address space and generating config for volatility
2014-11-20 09:42:33,740 - detector - INFO - Address space: <volatility.plugins.addrspaces.amd64.AMD64PagedMemory object at 0x086B3690>, Base: <volatility.plugins.addrspaces.win32pmem.Win32FileAddressSpace object at 0x07A10C30>
2014-11-20 09:42:33,740 - detector - INFO - Profile: <volatility.plugins.overlays.windows.win7.Win7SP1x64 object at 0x07A10DB0>, DTB: 0x187000
2014-11-20 09:42:33,743 - detector - INFO - Starting yara scanner...
2014-11-20 13:46:17,088 - detector - INFO - Scanning finished
2014-11-20 13:46:17,089 - detector.service - INFO - Trying to stop the winpmem service...
2014-11-20 13:46:17,091 - detector.service - INFO - Trying to delete the winpmem service...
2014-11-20 13:46:17,092 - detector - INFO - Service stopped
2014-11-20 13:46:17,092 - detector - INFO - Analysis finished
2015-01-12 17:12:01,976 - detector - INFO - Starting with process ID 5704
2015-01-12 17:12:02,023 - detector - ERROR - The user is not an Administrator, aborting
2015-01-12 19:17:19,019 - detector - INFO - Starting with process ID 4464
2015-01-12 19:17:19,019 - detector - INFO - Selected Profile Name: Win7SP1x64
2015-01-12 19:17:19,019 - detector - INFO - Selected Driver: C:\Users\Admin\AppData\Local\Temp\_MEI40162\drivers\winpmem64.sys
2015-01-12 19:17:19,019 - detector.service - INFO - Launching service destroyer...
2015-01-12 19:17:19,019 - detector.service - DEBUG - Unable to OpenService: (1060, 'OpenService', 'Der angegebene Dienst ist kein installierter Dienst.')
2015-01-12 19:17:19,019 - detector.service - INFO - Trying to stop the winpmem service...
2015-01-12 19:17:19,019 - detector.service - INFO - Trying to delete the winpmem service...
2015-01-12 19:17:19,019 - detector.service - DEBUG - Unable to delete the service: (6, 'DeleteService', 'Das Handle ist ung\xfcltig.')
2015-01-12 19:17:19,035 - detector.service - INFO - Trying to start the winpmem service...
2015-01-12 19:17:19,112 - detector - INFO - Service started
2015-01-12 19:17:19,112 - detector - INFO - Selected Yara signature file at C:\Users\Admin\AppData\Local\Temp\_MEI40162\rules\signatures.yar
2015-01-12 19:17:19,112 - detector - INFO - Obtaining address space and generating config for volatility
2015-01-12 19:17:20,877 - detector - INFO - Address space: <volatility.plugins.addrspaces.amd64.AMD64PagedMemory object at 0x089605F0>, Base: <volatility.plugins.addrspaces.win32pmem.Win32FileAddressSpace object at 0x07BEAA70>
2015-01-12 19:17:20,877 - detector - INFO - Profile: <volatility.plugins.overlays.windows.win7.Win7SP1x64 object at 0x07BEACF0>, DTB: 0x187000
2015-01-12 19:17:20,877 - detector - INFO - Starting yara scanner...
2015-01-12 20:13:04,266 - detector - WARNING - Process avguard.exe (pid: 1976) matched: Xtreme at address: 0x46D4B86, Value:
58 74 72 65 6d 65 52 41 54 2e 54 52 2f 47 72 61 XtremeRAT.TR/Gra
66 74 6f 72 2e 31 34 31 36 30 31 2e 54 52 2f 5a ftor.141601.TR/Z
75 73 79 2e 36 32 34 33 37 2e 54 52 2f 53 79 6d usy.62437.TR/Sym
6d 69 2e 34 30 36 31 37 2e 54 52 2f 4b 61 7a 79 mi.40617.TR/Kazy
2e 33 38 31 33 37 32 2e 41 50 50 4c 2f 53 65 76 .381372.APPL/Sev
61 73 2e 54 52 2f 53 74 72 69 63 74 6f 72 2e 35 as.TR/Strictor.5
31 38 32 37 2e 54 52 2f 53 70 79 2e 31 34 34 33 1827.TR/Spy.1443
38 34 2e 54 52 2f 4b 61 7a 79 2e 31 35 35 30 38 84.TR/Kazy.15508
36 2e 41 50 50 4c 2f 42 75 6e 64 6c 65 72 2e 41 6.APPL/Bundler.A
50 50 4c 2f 42 75 6e 64 6c 65 72 2e 41 67 65 6e PPL/Bundler.Agen
74 2e 54 52 2f 52 6f 67 75 65 2e 31 31 32 35 33 t.TR/Rogue.11253
39 34 39 2e 41 50 50 4c 2f 4f 75 74 42 72 6f 77 949.APPL/OutBrow
73 65 2e 41 6e 64 72 6f 69 64 2f 47 65 64 6d 61 se.Android/Gedma
2e 54 52 2f 53 74 72 69 63 74 6f 72 2e 34 30 35 .TR/Strictor.405
36 33 2e 41 50 50 4c 2f 53 6f 66 74 33 32 44 6f 63.APPL/Soft32Do
77 6e 2e 41 50 50 4c 2f 4f 70 74 49 6e 73 74 61 wn.APPL/OptInsta
2015-01-12 20:43:55,970 - detector - WARNING - Process Avira.OE.Servi (pid: 2892) matched: Xtreme at address: 0x6AE31FA4, Value:
58 74 72 65 6d 65 52 41 54 2e 54 52 2f 47 72 61 XtremeRAT.TR/Gra
0a 36 36 20 37 34 20 36 66 20 37 32 20 32 65 20 .66.74.6f.72.2e.
33 31 20 33 34 20 33 31 20 33 36 20 33 30 20 33 31.34.31.36.30.3
31 20 32 65 20 35 34 20 35 32 20 32 66 20 35 61 1.2e.54.52.2f.5a
20 66 74 6f 72 2e 31 34 31 36 30 31 2e 54 52 2f .ftor.141601.TR/
5a 0a 37 35 20 37 33 20 37 39 20 32 05 d0 a3 6f Z.75.73.79.2...o
00 00 a0 83 00 00 00 00 00 00 00 00 05 30 d4 64 .............0.d
00 00 c0 82 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 05 f0 63 70 00 00 80 b3 00 00 00 00 ......cp........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 05 20 7b 6f 00 00 00 b6 05 30 97 6e ......{o.....0.n
00 00 90 ea 05 40 6f 6e 00 00 10 b6 05 50 bf 6e .....@on.....P.n
00 00 20 b6 05 70 e3 6f 00 00 10 af 00 00 00 00 .....p.o........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 05 60 83 6f .............`.o
2015-01-12 22:23:11,983 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF61121A3, Value:
46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 FromBase64String
00 46 72 65 65 48 53 74 72 69 6e 67 00 50 74 72 .FreeHString.Ptr
54 6f 53 74 72 69 6e 67 48 53 74 72 69 6e 67 00 ToStringHString.
53 74 72 69 6e 67 54 6f 48 53 74 72 69 6e 67 00 StringToHString.
67 65 74 5f 53 74 72 69 6e 67 00 73 65 74 5f 53 get_String.set_S
74 72 69 6e 67 00 47 65 74 52 61 77 43 65 72 74 tring.GetRawCert
44 61 74 61 53 74 72 69 6e 67 00 4d 75 69 52 65 DataString.MuiRe
73 6f 75 72 63 65 4d 61 70 5f 52 65 73 6f 75 72 sourceMap_Resour
63 65 54 79 70 65 49 64 53 74 72 69 6e 67 00 67 ceTypeIdString.g
65 74 5f 52 65 73 6f 75 72 63 65 54 79 70 65 49 et_ResourceTypeI
64 53 74 72 69 6e 67 00 52 65 61 64 53 74 72 69 dString.ReadStri
6e 67 00 41 64 64 53 74 72 69 6e 67 00 46 72 6f ng.AddString.Fro
6d 53 65 72 69 61 6c 69 7a 65 64 53 74 72 69 6e mSerializedStrin
67 00 54 6f 53 65 72 69 61 6c 69 7a 65 64 53 74 g.ToSerializedSt
72 69 6e 67 00 47 65 74 53 65 72 69 61 6c 69 7a ring.GetSerializ
65 64 53 74 72 69 6e 67 00 45 78 70 61 6e 64 53 edString.ExpandS
2015-01-12 22:23:11,983 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60FF2A3, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 47 65 74 Base64String.Get
43 6f 6d 49 55 6e 6b 6e 6f 77 6e 00 53 69 7a 65 ComIUnknown.Size
64 52 65 66 65 72 65 6e 63 65 00 45 76 69 64 65 dReference.Evide
6e 63 65 43 6f 6c 6c 65 63 74 69 6f 6e 00 50 72 nceCollection.Pr
6f 76 69 64 65 64 53 65 63 75 72 69 74 79 49 6e ovidedSecurityIn
66 6f 00 43 72 65 61 74 6f 72 73 53 65 63 75 72 fo.CreatorsSecur
69 74 79 49 6e 66 6f 00 4f 6e 53 65 72 69 61 6c ityInfo.OnSerial
69 7a 69 6e 67 41 74 74 72 69 62 75 74 65 00 73 izingAttribute.s
65 63 75 72 69 74 79 45 76 69 64 65 6e 63 65 00 ecurityEvidence.
53 79 73 74 65 6d 2e 53 65 63 75 72 69 74 79 2e System.Security.
50 6f 6c 69 63 79 00 6d 5f 65 76 69 64 65 6e 63 Policy.m_evidenc
65 00 6d 5f 64 65 73 65 72 69 61 6c 69 7a 65 64 e.m_deserialized
54 61 72 67 65 74 45 76 69 64 65 6e 63 65 00 6d TargetEvidence.m
5f 68 6f 73 74 4c 69 73 74 00 6d 5f 61 73 73 65 _hostList.m_asse
6d 62 6c 79 4c 69 73 74 00 6d 5f 6c 6f 63 6b 65 mblyList.m_locke
64 00 47 65 74 45 76 69 64 65 6e 63 65 54 79 70 d.GetEvidenceTyp
2015-01-12 22:23:11,983 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF61121A7, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 46 72 65 Base64String.Fre
65 48 53 74 72 69 6e 67 00 50 74 72 54 6f 53 74 eHString.PtrToSt
72 69 6e 67 48 53 74 72 69 6e 67 00 53 74 72 69 ringHString.Stri
6e 67 54 6f 48 53 74 72 69 6e 67 00 67 65 74 5f ngToHString.get_
53 74 72 69 6e 67 00 73 65 74 5f 53 74 72 69 6e String.set_Strin
67 00 47 65 74 52 61 77 43 65 72 74 44 61 74 61 g.GetRawCertData
53 74 72 69 6e 67 00 4d 75 69 52 65 73 6f 75 72 String.MuiResour
63 65 4d 61 70 5f 52 65 73 6f 75 72 63 65 54 79 ceMap_ResourceTy
70 65 49 64 53 74 72 69 6e 67 00 67 65 74 5f 52 peIdString.get_R
65 73 6f 75 72 63 65 54 79 70 65 49 64 53 74 72 esourceTypeIdStr
69 6e 67 00 52 65 61 64 53 74 72 69 6e 67 00 41 ing.ReadString.A
64 64 53 74 72 69 6e 67 00 46 72 6f 6d 53 65 72 ddString.FromSer
69 61 6c 69 7a 65 64 53 74 72 69 6e 67 00 54 6f ializedString.To
53 65 72 69 61 6c 69 7a 65 64 53 74 72 69 6e 67 SerializedString
00 47 65 74 53 65 72 69 61 6c 69 7a 65 64 53 74 .GetSerializedSt
72 69 6e 67 00 45 78 70 61 6e 64 53 74 72 69 6e ring.ExpandStrin
2015-01-12 22:23:11,983 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF613832B, Value:
43 6f 6e 6e 65 63 74 65 64 00 53 65 74 46 75 6c Connected.SetFul
6c 79 43 6f 6e 6e 65 63 74 65 64 00 49 73 52 65 lyConnected.IsRe
6d 6f 74 65 44 69 73 63 6f 6e 6e 65 63 74 65 64 moteDisconnected
00 49 73 44 69 73 63 6f 6e 6e 65 63 74 65 64 00 .IsDisconnected.
49 73 46 75 6c 6c 79 44 69 73 63 6f 6e 6e 65 63 IsFullyDisconnec
74 65 64 00 49 73 48 61 6e 64 6c 65 52 65 64 69 ted.IsHandleRedi
72 65 63 74 65 64 00 5f 69 73 53 74 64 49 6e 52 rected._isStdInR
65 64 69 72 65 63 74 65 64 00 5f 69 73 45 72 72 edirected._isErr
6f 72 54 65 78 74 57 72 69 74 65 72 52 65 64 69 orTextWriterRedi
72 65 63 74 65 64 00 5f 69 73 4f 75 74 54 65 78 rected._isOutTex
74 57 72 69 74 65 72 52 65 64 69 72 65 63 74 65 tWriterRedirecte
64 00 5f 69 73 53 74 64 45 72 72 52 65 64 69 72 d._isStdErrRedir
65 63 74 65 64 00 5f 69 73 53 74 64 4f 75 74 52 ected._isStdOutR
65 64 69 72 65 63 74 65 64 00 62 4f 6c 64 46 6f edirected.bOldFo
72 6d 61 74 44 65 74 65 63 74 65 64 00 6d 5f 70 rmatDetected.m_p
72 6f 74 65 63 74 65 64 00 73 5f 50 65 72 6d 55 rotected.s_PermU
2015-01-12 22:23:11,983 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF613833D, Value:
43 6f 6e 6e 65 63 74 65 64 00 49 73 52 65 6d 6f Connected.IsRemo
74 65 44 69 73 63 6f 6e 6e 65 63 74 65 64 00 49 teDisconnected.I
73 44 69 73 63 6f 6e 6e 65 63 74 65 64 00 49 73 sDisconnected.Is
46 75 6c 6c 79 44 69 73 63 6f 6e 6e 65 63 74 65 FullyDisconnecte
64 00 49 73 48 61 6e 64 6c 65 52 65 64 69 72 65 d.IsHandleRedire
63 74 65 64 00 5f 69 73 53 74 64 49 6e 52 65 64 cted._isStdInRed
69 72 65 63 74 65 64 00 5f 69 73 45 72 72 6f 72 irected._isError
54 65 78 74 57 72 69 74 65 72 52 65 64 69 72 65 TextWriterRedire
63 74 65 64 00 5f 69 73 4f 75 74 54 65 78 74 57 cted._isOutTextW
72 69 74 65 72 52 65 64 69 72 65 63 74 65 64 00 riterRedirected.
5f 69 73 53 74 64 45 72 72 52 65 64 69 72 65 63 _isStdErrRedirec
74 65 64 00 5f 69 73 53 74 64 4f 75 74 52 65 64 ted._isStdOutRed
69 72 65 63 74 65 64 00 62 4f 6c 64 46 6f 72 6d irected.bOldForm
61 74 44 65 74 65 63 74 65 64 00 6d 5f 70 72 6f atDetected.m_pro
74 65 63 74 65 64 00 73 5f 50 65 72 6d 55 6e 72 tected.s_PermUnr
65 73 74 72 69 63 74 65 64 00 47 65 74 55 6e 72 estricted.GetUnr
2015-01-12 22:23:11,983 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60F98C1, Value:
52 65 63 65 69 76 65 72 00 44 61 74 65 54 69 6d Receiver.DateTim
65 50 61 72 73 65 00 46 75 73 69 6f 6e 00 54 69 eParse.Fusion.Ti
6d 65 53 70 61 6e 54 68 72 6f 77 53 74 79 6c 65 meSpanThrowStyle
00 53 79 6e 63 48 61 73 68 74 61 62 6c 65 00 52 .SyncHashtable.R
53 41 50 4b 43 53 31 53 48 41 31 53 69 67 6e 61 SAPKCS1SHA1Signa
74 75 72 65 44 65 73 63 72 69 70 74 69 6f 6e 00 tureDescription.
5f 53 74 72 6f 6e 67 4e 61 6d 65 4b 65 79 50 61 _StrongNameKeyPa
69 72 00 50 61 64 64 69 6e 67 4d 6f 64 65 00 4d ir.PaddingMode.M
65 74 68 6f 64 49 6d 70 6c 4f 70 74 69 6f 6e 73 ethodImplOptions
00 63 5f 74 69 63 6b 73 50 65 72 44 61 79 52 61 .c_ticksPerDayRa
6e 67 65 00 44 6f 6d 61 69 6e 53 70 65 63 69 66 nge.DomainSpecif
69 63 52 65 6d 6f 74 69 6e 67 44 61 74 61 00 41 icRemotingData.A
72 67 75 6d 65 6e 74 5f 49 6e 76 61 6c 69 64 52 rgument_InvalidR
65 67 69 73 74 72 79 4b 65 79 50 65 72 6d 69 73 egistryKeyPermis
73 69 6f 6e 43 68 65 63 6b 00 53 74 6f 72 65 54 sionCheck.StoreT
72 61 6e 73 61 63 74 69 6f 6e 00 3c 52 65 61 64 ransaction.<Read
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60FBEE9, Value:
52 65 63 65 69 76 65 72 48 6f 6f 6b 00 49 73 6f ReceiverHook.Iso
6c 61 74 65 64 53 74 6f 72 61 67 65 46 69 6c 65 latedStorageFile
00 74 79 70 65 6f 66 53 6f 61 70 49 64 72 65 66 .typeofSoapIdref
73 00 52 65 67 69 73 74 65 72 65 64 43 68 61 6e s.RegisteredChan
6e 65 6c 00 61 73 73 65 6d 62 6c 79 52 65 73 6f nel.assemblyReso
6c 76 65 72 00 4f 62 6a 65 63 74 49 44 47 65 6e lver.ObjectIDGen
65 72 61 74 6f 72 00 44 69 63 74 69 6f 6e 61 72 erator.Dictionar
79 45 6e 75 6d 65 72 61 74 6f 72 42 79 4b 65 79 yEnumeratorByKey
73 00 42 69 74 43 6f 6e 76 65 72 74 65 72 00 45 s.BitConverter.E
76 65 6e 74 4c 69 73 74 65 6e 65 72 00 47 65 74 ventListener.Get
4d 6f 64 75 6c 65 48 61 6e 64 6c 65 00 53 74 64 ModuleHandle.Std
43 6f 6e 55 6e 69 63 6f 64 65 45 6e 63 6f 64 69 ConUnicodeEncodi
6e 67 00 49 6e 74 65 72 6e 61 6c 47 65 74 53 6f ng.InternalGetSo
72 74 56 65 72 73 69 6f 6e 00 52 53 41 4f 41 45 rtVersion.RSAOAE
50 4b 65 79 45 78 63 68 61 6e 67 65 46 6f 72 6d PKeyExchangeForm
61 74 74 65 72 00 54 79 70 65 4c 69 62 56 61 72 atter.TypeLibVar
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF6111242, Value:
52 65 63 65 69 76 65 00 41 72 63 68 69 76 65 00 Receive.Archive.
67 65 74 5f 4b 65 65 70 41 6c 69 76 65 00 3c 3e get_KeepAlive.<>
33 5f 5f 66 72 6f 6d 49 6e 63 6c 75 73 69 76 65 3__fromInclusive
00 67 65 74 5f 53 63 68 65 64 75 6c 65 64 45 78 .get_ScheduledEx
63 6c 75 73 69 76 65 00 3c 3e 33 5f 5f 74 6f 45 clusive.<>3__toE
78 63 6c 75 73 69 76 65 00 4d 61 72 73 68 61 6c xclusive.Marshal
4d 61 6e 61 67 65 64 54 6f 4e 61 74 69 76 65 00 ManagedToNative.
50 61 63 6b 46 6f 72 4e 61 74 69 76 65 00 53 65 PackForNative.Se
74 50 72 69 6f 72 69 74 79 4e 61 74 69 76 65 00 tPriorityNative.
41 73 73 75 6d 65 4e 65 67 61 74 69 76 65 00 53 AssumeNegative.S
65 6c 66 52 65 6c 61 74 69 76 65 00 53 65 74 54 elfRelative.SetT
68 72 6f 77 4f 6e 52 65 6c 61 74 69 76 65 00 4e hrowOnRelative.N
61 74 69 76 65 52 65 67 69 73 74 65 72 52 65 6c ativeRegisterRel
61 74 69 76 65 00 49 73 43 75 72 72 65 6e 74 41 ative.IsCurrentA
63 74 69 76 69 74 79 41 63 74 69 76 65 00 67 65 ctivityActive.ge
74 5f 55 73 65 72 49 6e 74 65 72 61 63 74 69 76 t_UserInteractiv
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF612EA28, Value:
52 65 63 65 69 76 65 72 43 6f 75 6e 74 00 6e 6f ReceiverCount.no
64 65 73 43 6f 75 6e 74 00 5f 6f 75 74 41 72 67 desCount._outArg
73 43 6f 75 6e 74 00 72 65 70 6c 61 63 65 6d 65 sCount.replaceme
6e 74 73 43 6f 75 6e 74 00 70 72 65 76 69 6f 75 ntsCount.previou
73 43 6f 75 6e 74 00 72 65 70 65 61 74 43 6f 75 sCount.repeatCou
6e 74 00 74 61 72 67 65 74 43 6f 75 6e 74 00 62 nt.targetCount.b
75 63 6b 65 74 43 6f 75 6e 74 00 72 69 67 68 74 ucketCount.right
42 69 74 53 68 69 66 74 43 6f 75 6e 74 00 65 6c BitShiftCount.el
65 6d 65 6e 74 43 6f 75 6e 74 00 67 65 74 5f 41 ementCount.get_A
72 67 75 6d 65 6e 74 43 6f 75 6e 74 00 44 65 66 rgumentCount.Def
61 75 6c 74 43 6f 6d 70 6f 6e 65 6e 74 43 6f 75 aultComponentCou
6e 74 00 5f 74 6f 6b 65 6e 4c 69 73 74 43 6f 75 nt._tokenListCou
6e 74 00 6d 65 74 68 6f 64 49 6e 73 74 43 6f 75 nt.methodInstCou
6e 74 00 74 79 70 65 49 6e 73 74 43 6f 75 6e 74 nt.typeInstCount
00 69 6e 70 75 74 43 6f 75 6e 74 00 6d 5f 6d 61 .inputCount.m_ma
78 43 6f 75 6e 74 00 6b 65 79 43 6f 75 6e 74 00 xCount.keyCount.
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF61473E8, Value:
52 65 63 65 69 76 65 72 00 47 65 74 52 65 73 6f Receiver.GetReso
6c 76 65 72 00 47 65 74 55 6e 77 72 61 70 70 65 lver.GetUnwrappe
64 53 65 72 76 65 72 00 44 65 74 61 63 68 53 65 dServer.DetachSe
72 76 65 72 00 41 74 74 61 63 68 53 65 72 76 65 rver.AttachServe
72 00 5f 73 65 72 76 65 72 00 53 65 74 45 72 72 r._server.SetErr
6f 72 4d 6f 64 65 5f 57 69 6e 37 41 6e 64 4e 65 orMode_Win7AndNe
77 65 72 00 4d 61 6b 65 55 52 49 4b 65 79 4e 6f wer.MakeURIKeyNo
4c 6f 77 65 72 00 52 75 6e 49 6e 69 74 69 61 6c Lower.RunInitial
69 7a 65 72 00 4c 65 61 73 65 54 69 6d 65 41 6e izer.LeaseTimeAn
61 6c 79 7a 65 72 00 5f 6c 6f 63 61 6c 44 61 74 alyzer._localDat
61 53 74 6f 72 65 4d 67 72 00 6d 5f 49 73 43 6f aStoreMgr.m_IsCo
72 72 65 6c 61 74 69 6f 6e 4d 67 72 00 53 79 73 rrelationMgr.Sys
74 65 6d 52 65 73 4d 67 72 00 6d 5f 6d 67 72 00 temResMgr.m_mgr.
73 5f 61 70 70 44 61 74 61 44 69 72 00 6d 5f 53 s_appDataDir.m_S
75 62 44 69 72 00 6d 5f 6e 53 75 62 44 69 72 00 ubDir.m_nSubDir.
47 65 74 44 65 6d 61 6e 64 44 69 72 00 64 65 6d GetDemandDir.dem
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF5EA3007, Value:
53 65 6e 64 54 6f 00 53 74 61 72 74 4d 65 6e 75 SendTo.StartMenu
00 4d 79 4d 75 73 69 63 00 4d 79 56 69 64 65 6f .MyMusic.MyVideo
73 00 44 65 73 6b 74 6f 70 44 69 72 65 63 74 6f s.DesktopDirecto
72 79 00 4d 79 43 6f 6d 70 75 74 65 72 00 4e 65 ry.MyComputer.Ne
74 77 6f 72 6b 53 68 6f 72 74 63 75 74 73 00 46 tworkShortcuts.F
6f 6e 74 73 00 54 65 6d 70 6c 61 74 65 73 00 43 onts.Templates.C
6f 6d 6d 6f 6e 53 74 61 72 74 4d 65 6e 75 00 43 ommonStartMenu.C
6f 6d 6d 6f 6e 50 72 6f 67 72 61 6d 73 00 43 6f ommonPrograms.Co
6d 6d 6f 6e 53 74 61 72 74 75 70 00 43 6f 6d 6d mmonStartup.Comm
6f 6e 44 65 73 6b 74 6f 70 44 69 72 65 63 74 6f onDesktopDirecto
72 79 00 41 70 70 6c 69 63 61 74 69 6f 6e 44 61 ry.ApplicationDa
74 61 00 50 72 69 6e 74 65 72 53 68 6f 72 74 63 ta.PrinterShortc
75 74 73 00 4c 6f 63 61 6c 41 70 70 6c 69 63 61 uts.LocalApplica
74 69 6f 6e 44 61 74 61 00 49 6e 74 65 72 6e 65 tionData.Interne
74 43 61 63 68 65 00 43 6f 6f 6b 69 65 73 00 48 tCache.Cookies.H
69 73 74 6f 72 79 00 43 6f 6d 6d 6f 6e 41 70 70 istory.CommonApp
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60E3340, Value:
53 00 65 00 6e 00 64 00 00 17 77 00 69 00 6e 00 S.e.n.d...w.i.n.
3a 00 52 00 65 00 63 00 65 00 69 00 76 00 65 00 :.R.e.c.e.i.v.e.
00 11 20 00 3c 00 74 00 61 00 73 00 6b 00 73 00 ....<.t.a.s.k.s.
3e 00 00 1d 20 00 20 00 3c 00 74 00 61 00 73 00 >.......<.t.a.s.
6b 00 20 00 6e 00 61 00 6d 00 65 00 3d 00 22 00 k...n.a.m.e.=.".
00 13 22 00 20 00 76 00 61 00 6c 00 75 00 65 00 .."...v.a.l.u.e.
3d 00 22 00 00 07 22 00 2f 00 3e 00 00 13 20 00 =."..."./.>.....
3c 00 2f 00 74 00 61 00 73 00 6b 00 73 00 3e 00 <./.t.a.s.k.s.>.
00 0f 20 00 3c 00 6d 00 61 00 70 00 73 00 3e 00 ....<.m.a.p.s.>.
00 11 76 00 61 00 6c 00 75 00 65 00 4d 00 61 00 ..v.a.l.u.e.M.a.
70 00 00 0d 62 00 69 00 74 00 4d 00 61 00 70 00 p...b.i.t.M.a.p.
00 07 20 00 20 00 3c 00 00 0f 20 00 6e 00 61 00 ......<.....n.a.
6d 00 65 00 3d 00 22 00 00 03 78 00 00 23 20 00 m.e.=."...x..#..
20 00 20 00 3c 00 6d 00 61 00 70 00 20 00 76 00 ....<.m.a.p...v.
61 00 6c 00 75 00 65 00 3d 00 22 00 30 00 78 00 a.l.u.e.=.".0.x.
00 07 6d 00 61 00 70 00 00 09 20 00 20 00 3c 00 ..m.a.p.......<.
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60F4F93, Value:
53 65 6e 64 65 72 00 50 72 6f 63 65 73 73 53 69 Sender.ProcessSi
6e 6b 50 72 6f 76 69 64 65 72 44 61 74 61 00 41 nkProviderData.A
70 70 6c 69 63 61 74 69 6f 6e 54 72 75 73 74 45 pplicationTrustE
6e 75 6d 65 72 61 74 6f 72 00 53 61 66 65 56 69 numerator.SafeVi
65 77 4f 66 46 69 6c 65 48 61 6e 64 6c 65 00 42 ewOfFileHandle.B
69 6e 61 72 79 4f 62 6a 65 63 74 57 69 74 68 4d inaryObjectWithM
61 70 54 79 70 65 64 00 73 65 74 5f 44 61 74 65 apTyped.set_Date
54 69 6d 65 46 6f 72 6d 61 74 00 49 64 6e 4d 61 TimeFormat.IdnMa
70 70 69 6e 67 00 43 6f 6d 45 76 65 6e 74 49 6e pping.ComEventIn
74 65 72 66 61 63 65 41 74 74 72 69 62 75 74 65 terfaceAttribute
00 53 74 6f 72 65 54 72 61 6e 73 61 63 74 69 6f .StoreTransactio
6e 4f 70 65 72 61 74 69 6f 6e 00 4d 61 6e 69 66 nOperation.Manif
65 73 74 45 6e 76 65 6c 6f 70 65 00 3c 57 72 69 estEnvelope.<Wri
74 65 41 73 79 6e 63 49 6e 74 65 72 6e 61 6c 3e teAsyncInternal>
64 5f 5f 65 00 49 6e 74 65 72 6e 61 6c 45 6e 63 d__e.InternalEnc
6f 64 69 6e 67 44 61 74 61 49 74 65 6d 00 54 68 odingDataItem.Th
2015-01-12 22:23:11,999 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60FC538, Value:
53 65 6e 64 4f 72 50 6f 73 74 43 61 6c 6c 62 61 SendOrPostCallba
63 6b 00 41 73 73 65 6d 62 6c 79 41 74 74 72 69 ck.AssemblyAttri
62 75 74 65 73 47 6f 48 65 72 65 00 49 45 6e 75 butesGoHere.IEnu
6d 44 65 66 69 6e 69 74 69 6f 6e 49 64 65 6e 74 mDefinitionIdent
69 74 79 00 53 79 73 74 65 6d 5f 4c 61 7a 79 44 ity.System_LazyD
65 62 75 67 56 69 65 77 60 31 00 73 5f 63 72 65 ebugView`1.s_cre
61 74 65 43 6f 6e 74 69 6e 67 65 6e 74 50 72 6f ateContingentPro
70 65 72 74 69 65 73 00 49 53 74 72 75 63 74 75 perties.IStructu
72 61 6c 43 6f 6d 70 61 72 61 62 6c 65 00 6d 5f ralComparable.m_
6e 65 77 4d 75 74 65 78 00 73 65 74 5f 44 65 63 newMutex.set_Dec
6f 64 65 72 46 61 6c 6c 62 61 63 6b 00 52 65 6d oderFallback.Rem
6f 74 69 6e 67 54 79 70 65 43 61 63 68 65 64 44 otingTypeCachedD
61 74 61 00 4d 75 69 52 65 73 6f 75 72 63 65 4d ata.MuiResourceM
61 70 45 6e 74 72 79 46 69 65 6c 64 49 64 00 44 apEntryFieldId.D
65 73 63 72 69 70 74 69 6f 6e 4d 65 74 61 64 61 escriptionMetada
74 61 45 6e 74 72 79 46 69 65 6c 64 49 64 00 44 taEntryFieldId.D
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60FFB8A, Value:
53 65 6e 64 4d 61 6e 69 66 65 73 74 00 45 6e 73 SendManifest.Ens
75 72 65 49 6e 69 74 69 61 6c 69 7a 65 64 00 41 ureInitialized.A
6e 79 45 76 65 6e 74 45 6e 61 62 6c 65 64 00 56 nyEventEnabled.V
61 6c 69 64 61 74 65 45 76 65 6e 74 4f 70 63 6f alidateEventOpco
64 65 46 6f 72 54 72 61 6e 73 66 65 72 00 49 73 deForTransfer.Is
45 6e 61 62 6c 65 64 42 79 44 65 66 61 75 6c 74 EnabledByDefault
00 57 72 69 74 65 53 74 72 69 6e 67 54 6f 41 6c .WriteStringToAl
6c 4c 69 73 74 65 6e 65 72 73 00 57 72 69 74 65 lListeners.Write
45 76 65 6e 74 53 74 72 69 6e 67 00 57 72 69 74 EventString.Writ
65 54 6f 41 6c 6c 4c 69 73 74 65 6e 65 72 73 00 eToAllListeners.
57 72 69 74 65 45 76 65 6e 74 56 61 72 61 72 67 WriteEventVararg
73 00 47 65 74 44 69 73 70 61 74 63 68 65 72 00 s.GetDispatcher.
44 65 63 6f 64 65 4f 62 6a 65 63 74 00 47 65 6e DecodeObject.Gen
65 72 61 74 65 47 75 69 64 46 72 6f 6d 4e 61 6d erateGuidFromNam
65 00 52 65 70 6f 72 74 4f 75 74 4f 66 42 61 6e e.ReportOutOfBan
64 4d 65 73 73 61 67 65 00 4f 75 74 70 75 74 44 dMessage.OutputD
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60FFD07, Value:
53 65 6e 64 43 6f 6d 6d 61 6e 64 00 57 72 69 74 SendCommand.Writ
65 45 76 65 6e 74 57 69 74 68 52 65 6c 61 74 65 eEventWithRelate
64 41 63 74 69 76 69 74 79 49 64 00 57 72 69 74 dActivityId.Writ
65 45 76 65 6e 74 00 57 72 69 74 65 45 76 65 6e eEvent.WriteEven
74 57 69 74 68 52 65 6c 61 74 65 64 41 63 74 69 tWithRelatedActi
76 69 74 79 49 64 43 6f 72 65 00 57 72 69 74 65 vityIdCore.Write
45 76 65 6e 74 43 6f 72 65 00 57 72 69 74 65 53 EventCore.WriteS
74 72 69 6e 67 54 6f 4c 69 73 74 65 6e 65 72 00 tringToListener.
45 76 65 6e 74 57 72 69 74 65 53 74 72 69 6e 67 EventWriteString
00 67 65 74 5f 43 6f 6e 73 74 72 75 63 74 69 6f .get_Constructio
6e 45 78 63 65 70 74 69 6f 6e 00 67 65 74 5f 46 nException.get_F
61 6c 6c 62 61 63 6b 41 63 74 69 76 69 74 79 49 allbackActivityI
64 00 67 65 74 5f 49 6e 74 65 72 6e 61 6c 43 75 d.get_InternalCu
72 72 65 6e 74 54 68 72 65 61 64 41 63 74 69 76 rrentThreadActiv
69 74 79 49 64 00 67 65 74 5f 43 75 72 72 65 6e ityId.get_Curren
74 54 68 72 65 61 64 41 63 74 69 76 69 74 79 49 tThreadActivityI
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF610C9BD, Value:
53 65 6e 64 00 67 65 74 5f 41 70 70 65 6e 64 00 Send.get_Append.
73 65 74 5f 41 70 70 65 6e 64 00 53 75 73 70 65 set_Append.Suspe
6e 64 00 46 52 65 76 65 72 73 65 42 69 6e 64 00 nd.FReverseBind.
46 49 6d 6d 65 64 69 61 74 65 42 69 6e 64 00 46 FImmediateBind.F
44 65 66 61 75 6c 74 42 69 6e 64 00 46 44 69 73 DefaultBind.FDis
70 6c 61 79 42 69 6e 64 00 47 65 74 50 45 4b 69 playBind.GetPEKi
6e 64 00 67 65 74 5f 4b 69 6e 64 00 41 72 67 5f nd.get_Kind.Arg_
52 65 67 53 65 74 4d 69 73 6d 61 74 63 68 65 64 RegSetMismatched
4b 69 6e 64 00 67 65 74 5f 46 61 69 6c 75 72 65 Kind.get_Failure
4b 69 6e 64 00 47 65 74 56 61 6c 75 65 4b 69 6e Kind.GetValueKin
64 00 47 65 74 43 6f 72 72 65 73 70 6f 6e 64 69 d.GetCorrespondi
6e 67 4b 69 6e 64 00 52 6f 75 6e 64 74 72 69 70 ngKind.Roundtrip
4b 69 6e 64 00 67 65 74 5f 41 64 64 72 65 73 73 Kind.get_Address
4b 69 6e 64 00 53 70 65 63 69 66 79 4b 69 6e 64 Kind.SpecifyKind
00 66 75 6e 63 6b 69 6e 64 00 74 79 70 65 6b 69 .funckind.typeki
6e 64 00 76 61 72 6b 69 6e 64 00 73 79 73 6b 69 nd.varkind.syski
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF6116AB1, Value:
53 65 6e 64 54 6f 00 4d 6f 76 65 54 6f 00 52 65 SendTo.MoveTo.Re
6c 61 74 69 76 65 50 61 74 68 54 6f 00 45 71 75 lativePathTo.Equ
61 6c 54 6f 00 67 65 74 5f 45 78 74 72 61 49 6e alTo.get_ExtraIn
66 6f 00 73 65 74 5f 45 78 74 72 61 49 6e 66 6f fo.set_ExtraInfo
00 46 6f 72 6d 61 74 53 74 75 62 49 6e 66 6f 00 .FormatStubInfo.
49 6e 74 65 72 6e 61 6c 47 65 74 43 6f 6d 53 6c InternalGetComSl
6f 74 46 6f 72 4d 65 74 68 6f 64 49 6e 66 6f 00 otForMethodInfo.
47 65 74 4d 65 74 68 6f 64 49 6e 66 6f 00 47 65 GetMethodInfo.Ge
74 44 65 73 65 72 69 61 6c 69 7a 65 64 54 69 6d tDeserializedTim
65 5a 6f 6e 65 49 6e 66 6f 00 67 65 74 5f 54 79 eZoneInfo.get_Ty
70 65 49 6e 66 6f 00 73 65 74 5f 54 79 70 65 49 peInfo.set_TypeI
6e 66 6f 00 43 72 65 61 74 65 54 79 70 65 49 6e nfo.CreateTypeIn
66 6f 00 47 65 74 52 65 66 54 79 70 65 49 6e 66 fo.GetRefTypeInf
6f 00 52 65 66 6c 65 63 74 69 6f 6e 54 79 70 65 o.ReflectionType
49 6e 66 6f 00 53 79 73 74 65 6d 2e 52 75 6e 74 Info.System.Runt
69 6d 65 2e 49 6e 74 65 72 6f 70 53 65 72 76 69 ime.InteropServi
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF612F093, Value:
53 65 6e 64 4d 65 73 73 61 67 65 54 69 6d 65 6f SendMessageTimeo
75 74 00 73 5f 69 73 53 70 6f 6e 73 6f 72 73 68 ut.s_isSponsorsh
69 70 54 69 6d 65 6f 75 74 00 5f 73 70 6f 6e 73 ipTimeout._spons
6f 72 73 68 69 70 54 69 6d 65 6f 75 74 00 6f 72 orshipTimeout.or
69 67 69 6e 61 6c 57 61 69 74 4d 69 6c 6c 69 73 iginalWaitMillis
65 63 6f 6e 64 73 54 69 6d 65 6f 75 74 00 74 69 econdsTimeout.ti
6d 65 6f 75 74 00 73 73 6f 75 74 00 53 65 74 43 meout.ssout.SetC
6c 61 73 73 4c 61 79 6f 75 74 00 56 61 6c 69 64 lassLayout.Valid
61 74 65 50 75 73 68 50 6f 70 52 61 6e 67 65 49 atePushPopRangeI
6e 70 75 74 00 52 65 61 64 43 6f 6e 73 6f 6c 65 nput.ReadConsole
49 6e 70 75 74 00 68 43 6f 6e 73 6f 6c 65 49 6e Input.hConsoleIn
70 75 74 00 50 65 65 6b 43 6f 6e 73 6f 6c 65 49 put.PeekConsoleI
6e 70 75 74 00 73 74 72 49 6e 70 75 74 00 64 77 nput.strInput.dw
49 6e 70 75 74 00 69 6e 70 75 74 00 52 65 61 64 Input.input.Read
43 6f 6e 73 6f 6c 65 4f 75 74 70 75 74 00 57 72 ConsoleOutput.Wr
69 74 65 43 6f 6e 73 6f 6c 65 4f 75 74 70 75 74 iteConsoleOutput
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF613A3D4, Value:
53 65 6e 64 69 6e 67 4d 65 73 73 61 67 65 00 43 SendingMessage.C
4f 52 50 72 6f 66 69 6c 65 72 52 65 6d 6f 74 69 ORProfilerRemoti
6e 67 53 65 72 76 65 72 52 65 63 65 69 76 69 6e ngServerReceivin
67 4d 65 73 73 61 67 65 00 41 63 74 69 76 61 74 gMessage.Activat
65 57 69 74 68 4d 65 73 73 61 67 65 00 5f 6e 75 eWithMessage._nu
6c 6c 4d 65 73 73 61 67 65 00 53 65 74 43 61 6c llMessage.SetCal
6c 43 6f 6e 74 65 78 74 49 6e 4d 65 73 73 61 67 lContextInMessag
65 00 46 6f 72 6d 61 74 46 69 6c 65 4c 6f 61 64 e.FormatFileLoad
45 78 63 65 70 74 69 6f 6e 4d 65 73 73 61 67 65 ExceptionMessage
00 48 61 6e 64 6c 65 52 65 74 75 72 6e 4d 65 73 .HandleReturnMes
73 61 67 65 00 50 72 6f 70 61 67 61 74 65 43 61 sage.PropagateCa
6c 6c 43 6f 6e 74 65 78 74 46 72 6f 6d 54 68 72 llContextFromThr
65 61 64 54 6f 4d 65 73 73 61 67 65 00 50 72 6f eadToMessage.Pro
70 61 67 61 74 65 4f 75 74 67 6f 69 6e 67 48 65 pagateOutgoingHe
61 64 65 72 73 54 6f 4d 65 73 73 61 67 65 00 67 adersToMessage.g
65 74 5f 43 6f 6e 73 74 72 75 63 74 6f 72 4d 65 et_ConstructorMe
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF6143857, Value:
53 65 6e 64 43 72 6f 73 73 44 6f 6d 61 69 6e 00 SendCrossDomain.
6d 5f 69 73 53 61 66 65 43 72 6f 73 73 44 6f 6d m_isSafeCrossDom
61 69 6e 00 6d 5f 74 61 72 67 65 74 44 6f 6d 61 ain.m_targetDoma
69 6e 00 47 65 74 44 65 66 61 75 6c 74 44 6f 6d in.GetDefaultDom
61 69 6e 00 49 6e 64 69 63 42 65 67 69 6e 00 52 ain.IndicBegin.R
65 61 64 42 65 67 69 6e 00 57 72 69 74 65 42 65 eadBegin.WriteBe
67 69 6e 00 4d 75 6c 74 69 42 79 74 65 42 65 67 gin.MultiByteBeg
69 6e 00 41 70 70 65 6e 64 4f 72 69 67 69 6e 00 in.AppendOrigin.
45 6e 74 65 72 4d 79 4c 6f 63 6b 53 70 69 6e 00 EnterMyLockSpin.
73 5f 52 63 6f 6e 00 67 65 74 5f 52 65 67 69 6f s_Rcon.get_Regio
6e 00 47 65 74 43 75 6c 74 75 72 65 44 61 74 61 n.GetCultureData
46 6f 72 52 65 67 69 6f 6e 00 41 64 64 41 63 63 ForRegion.AddAcc
65 73 73 45 6e 74 72 79 41 6e 64 55 6e 69 6f 6e essEntryAndUnion
00 5f 74 79 70 65 55 6e 69 6f 6e 00 6d 5f 69 67 ._typeUnion.m_ig
6e 6f 72 65 50 65 72 73 69 73 74 65 64 44 65 63 norePersistedDec
69 73 69 6f 6e 00 55 49 6e 74 33 32 50 72 65 63 ision.UInt32Prec
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF6146472, Value:
53 65 6e 64 65 72 00 5f 74 79 70 65 4c 69 6d 69 Sender._typeLimi
74 69 6e 67 42 69 6e 64 65 72 00 73 5f 46 6f 72 tingBinder.s_For
77 61 72 64 43 61 6c 6c 42 69 6e 64 65 72 00 64 wardCallBinder.d
65 66 61 75 6c 74 42 69 6e 64 65 72 00 6d 5f 62 efaultBinder.m_b
69 6e 64 65 72 00 53 65 72 69 61 6c 69 7a 65 44 inder.SerializeD
65 63 6f 64 65 72 00 62 55 73 65 64 45 6e 63 6f ecoder.bUsedEnco
64 65 72 00 53 65 72 69 61 6c 69 7a 65 45 6e 63 der.SerializeEnc
6f 64 65 72 00 47 65 74 59 65 61 72 4d 6f 6e 74 oder.GetYearMont
68 4f 72 64 65 72 00 43 72 65 61 74 65 50 61 72 hOrder.CreatePar
61 6d 4f 72 64 65 72 00 47 65 74 59 65 61 72 4d amOrder.GetYearM
6f 6e 74 68 44 61 79 4f 72 64 65 72 00 41 72 67 onthDayOrder.Arg
5f 41 72 72 61 79 4c 65 6e 67 74 68 73 44 69 66 _ArrayLengthsDif
66 65 72 00 46 6c 75 73 68 4f 53 42 75 66 66 65 fer.FlushOSBuffe
72 00 6d 5f 64 65 70 61 64 42 75 66 66 65 72 00 r.m_depadBuffer.
41 6c 6c 6f 63 61 74 65 42 75 66 66 65 72 00 5f AllocateBuffer._
6c 61 72 67 65 42 79 74 65 42 75 66 66 65 72 00 largeByteBuffer.
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF61500BF, Value:
53 65 6e 64 69 6e 67 52 65 70 6c 79 00 43 4f 52 SendingReply.COR
50 72 6f 66 69 6c 65 72 52 65 6d 6f 74 69 6e 67 ProfilerRemoting
43 6c 69 65 6e 74 52 65 63 65 69 76 69 6e 67 52 ClientReceivingR
65 70 6c 79 00 43 61 6e 53 6d 75 67 67 6c 65 4f eply.CanSmuggleO
62 6a 65 63 74 44 69 72 65 63 74 6c 79 00 49 73 bjectDirectly.Is
44 75 6d 6d 79 00 53 65 74 44 75 6d 6d 79 00 53 Dummy.SetDummy.S
65 74 44 65 6e 79 00 4d 65 6d 63 70 79 00 43 68 etDeny.Memcpy.Ch
65 63 6b 4d 75 6c 74 69 43 6f 6e 74 69 6e 75 61 eckMultiContinua
74 69 6f 6e 54 61 73 6b 73 41 6e 64 43 6f 70 79 tionTasksAndCopy
00 54 68 72 65 61 64 53 61 66 65 43 6f 70 79 00 .ThreadSafeCopy.
55 6e 73 61 66 65 43 6f 70 79 00 43 72 65 61 74 UnsafeCopy.Creat
65 53 6d 75 67 67 6c 65 61 62 6c 65 43 6f 70 79 eSmuggleableCopy
00 47 65 74 49 6e 64 65 78 50 61 72 61 6d 65 74 .GetIndexParamet
65 72 73 4e 6f 43 6f 70 79 00 47 65 74 50 65 72 ersNoCopy.GetPer
6d 69 73 73 69 6f 6e 53 65 74 4e 6f 43 6f 70 79 missionSetNoCopy
00 53 65 74 50 65 72 6d 69 73 73 69 6f 6e 53 65 .SetPermissionSe
2015-01-12 22:23:12,013 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF610D9EC, Value:
44 65 6c 65 74 65 53 75 62 4b 65 79 54 72 65 65 DeleteSubKeyTree
00 67 65 74 5f 43 6f 6e 73 69 73 74 65 6e 63 79 .get_Consistency
47 75 61 72 61 6e 74 65 65 00 54 72 65 61 74 41 Guarantee.TreatA
73 53 61 66 65 00 53 79 73 74 65 6d 2e 54 68 72 sSafe.System.Thr
65 61 64 69 6e 67 2e 54 61 73 6b 73 2e 49 50 72 eading.Tasks.IPr
6f 64 75 63 65 72 43 6f 6e 73 75 6d 65 72 51 75 oducerConsumerQu
65 75 65 3c 54 3e 2e 47 65 74 43 6f 75 6e 74 53 eue<T>.GetCountS
61 66 65 00 44 65 70 6c 6f 79 6d 65 6e 74 4d 65 afe.DeploymentMe
74 61 64 61 74 61 5f 4d 61 78 69 6d 75 6d 41 67 tadata_MaximumAg
65 00 67 65 74 5f 4d 61 78 69 6d 75 6d 41 67 65 e.get_MaximumAge
00 42 67 65 00 67 65 74 5f 45 42 43 44 49 43 43 .Bge.get_EBCDICC
6f 64 65 50 61 67 65 00 67 65 74 5f 41 4e 53 49 odePage.get_ANSI
43 6f 64 65 50 61 67 65 00 67 65 74 5f 4f 45 4d CodePage.get_OEM
43 6f 64 65 50 61 67 65 00 67 65 74 5f 43 6f 64 CodePage.get_Cod
65 50 61 67 65 00 67 65 74 5f 4d 61 63 43 6f 64 ePage.get_MacCod
65 50 61 67 65 00 67 65 74 5f 57 69 6e 64 6f 77 ePage.get_Window
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF611E130, Value:
44 65 6c 65 74 65 53 75 62 4b 65 79 00 49 6e 76 DeleteSubKey.Inv
61 6c 69 64 4f 70 65 72 61 74 69 6f 6e 5f 52 65 alidOperation_Re
67 52 65 6d 6f 76 65 53 75 62 4b 65 79 00 73 65 gRemoveSubKey.se
74 5f 50 75 62 6c 69 63 4b 65 79 00 53 74 72 6f t_PublicKey.Stro
6e 67 4e 61 6d 65 54 6f 6b 65 6e 46 72 6f 6d 50 ngNameTokenFromP
75 62 6c 69 63 4b 65 79 00 53 74 72 6f 6e 67 4e ublicKey.StrongN
61 6d 65 47 65 74 50 75 62 6c 69 63 4b 65 79 00 ameGetPublicKey.
53 65 74 50 75 62 6c 69 63 4b 65 79 00 52 65 61 SetPublicKey.Rea
64 4b 65 79 00 45 6e 68 61 6e 63 65 64 4b 65 79 dKey.EnhancedKey
00 55 73 65 55 73 65 72 50 72 6f 74 65 63 74 65 .UseUserProtecte
64 4b 65 79 00 47 65 6e 65 72 61 74 65 52 65 66 dKey.GenerateRef
65 72 65 6e 63 65 4b 65 79 00 55 73 65 4e 6f 6e erenceKey.UseNon
45 78 70 6f 72 74 61 62 6c 65 4b 65 79 00 55 73 ExportableKey.Us
65 41 72 63 68 69 76 61 62 6c 65 4b 65 79 00 4f eArchivableKey.O
70 65 6e 52 65 6d 6f 74 65 42 61 73 65 4b 65 79 penRemoteBaseKey
00 4f 70 65 6e 42 61 73 65 4b 65 79 00 5f 47 65 .OpenBaseKey._Ge
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF6141E0C, Value:
44 65 6c 65 74 65 53 75 62 4b 65 79 54 72 65 65 DeleteSubKeyTree
49 6e 74 65 72 6e 61 6c 00 47 65 74 45 76 65 6e Internal.GetEven
74 52 65 67 69 73 74 72 61 74 69 6f 6e 54 6f 6b tRegistrationTok
65 6e 54 61 62 6c 65 49 6e 74 65 72 6e 61 6c 00 enTableInternal.
52 65 73 6f 6c 76 65 46 69 65 6c 64 48 61 6e 64 ResolveFieldHand
6c 65 49 6e 74 65 72 6e 61 6c 00 52 65 73 6f 6c leInternal.Resol
76 65 4d 65 74 68 6f 64 48 61 6e 64 6c 65 49 6e veMethodHandleIn
74 65 72 6e 61 6c 00 52 65 73 6f 6c 76 65 54 79 ternal.ResolveTy
70 65 48 61 6e 64 6c 65 49 6e 74 65 72 6e 61 6c peHandleInternal
00 44 65 66 69 6e 65 44 79 6e 61 6d 69 63 4d 6f .DefineDynamicMo
64 75 6c 65 49 6e 74 65 72 6e 61 6c 00 67 65 74 duleInternal.get
5f 4e 61 6d 65 49 6e 74 65 72 6e 61 6c 00 47 65 _NameInternal.Ge
74 54 79 70 65 4c 69 62 4e 61 6d 65 49 6e 74 65 tTypeLibNameInte
72 6e 61 6c 00 4c 6f 61 64 57 69 74 68 50 61 72 rnal.LoadWithPar
74 69 61 6c 4e 61 6d 65 49 6e 74 65 72 6e 61 6c tialNameInternal
00 47 65 74 4d 61 6e 61 67 65 64 54 79 70 65 49 .GetManagedTypeI
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF610E950, Value:
67 65 74 5f 4d 61 63 68 69 6e 65 4e 61 6d 65 00 get_MachineName.
67 65 74 5f 53 63 6f 70 65 4e 61 6d 65 00 73 65 get_ScopeName.se
74 5f 54 79 70 65 4e 61 6d 65 00 67 65 74 5f 56 t_TypeName.get_V
69 73 75 61 6c 69 7a 65 72 4f 62 6a 65 63 74 53 isualizerObjectS
6f 75 72 63 65 54 79 70 65 4e 61 6d 65 00 67 65 ourceTypeName.ge
74 5f 46 75 6c 6c 54 79 70 65 4e 61 6d 65 00 73 t_FullTypeName.s
65 74 5f 46 75 6c 6c 54 79 70 65 4e 61 6d 65 00 et_FullTypeName.
67 65 74 5f 58 6d 6c 54 79 70 65 4e 61 6d 65 00 get_XmlTypeName.
73 65 74 5f 58 6d 6c 54 79 70 65 4e 61 6d 65 00 set_XmlTypeName.
43 61 6e 43 61 73 74 54 6f 58 6d 6c 54 79 70 65 CanCastToXmlType
4e 61 6d 65 00 67 65 74 5f 41 63 74 69 76 61 74 Name.get_Activat
69 6f 6e 54 79 70 65 4e 61 6d 65 00 46 69 6c 74 ionTypeName.Filt
65 72 54 79 70 65 4e 61 6d 65 00 67 65 74 5f 56 erTypeName.get_V
69 73 75 61 6c 69 7a 65 72 54 79 70 65 4e 61 6d isualizerTypeNam
65 00 67 65 74 5f 49 6e 76 61 6c 69 64 43 75 6c e.get_InvalidCul
74 75 72 65 4e 61 6d 65 00 6c 61 73 74 43 75 6c tureName.lastCul
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60F06CF, Value:
67 65 74 5f 55 73 65 72 4e 61 6d 65 00 41 64 64 get_UserName.Add
50 65 72 6d 69 73 73 69 6f 6e 00 49 73 53 75 62 Permission.IsSub
63 6c 61 73 73 4f 66 00 47 65 74 50 72 6f 70 65 classOf.GetPrope
72 74 79 49 6d 70 6c 00 47 65 74 49 6e 74 65 72 rtyImpl.GetInter
66 61 63 65 73 00 67 65 74 5f 54 61 72 67 65 74 faces.get_Target
00 53 79 73 74 65 6d 2e 52 75 6e 74 69 6d 65 2e .System.Runtime.
49 6e 74 65 72 6f 70 53 65 72 76 69 63 65 73 2e InteropServices.
5f 54 79 70 65 2e 47 65 74 54 79 70 65 49 6e 66 _Type.GetTypeInf
6f 43 6f 75 6e 74 00 49 73 49 6e 73 74 61 6e 63 oCount.IsInstanc
65 4f 66 54 79 70 65 00 73 65 74 5f 46 6f 72 65 eOfType.set_Fore
67 72 6f 75 6e 64 43 6f 6c 6f 72 00 73 65 74 5f groundColor.set_
42 61 63 6b 67 72 6f 75 6e 64 43 6f 6c 6f 72 00 BackgroundColor.
67 65 74 5f 45 72 72 6f 72 00 73 65 74 5f 4c 65 get_Error.set_Le
61 73 65 54 69 6d 65 00 73 65 74 5f 4c 65 61 73 aseTime.set_Leas
65 4d 61 6e 61 67 65 72 50 6f 6c 6c 54 69 6d 65 eManagerPollTime
00 47 65 74 43 61 6c 6c 69 6e 67 41 73 73 65 6d .GetCallingAssem
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF60FD84F, Value:
67 65 74 5f 4c 61 73 74 57 72 69 74 65 54 69 6d get_LastWriteTim
65 00 67 65 74 5f 54 69 6d 65 4f 66 44 61 79 00 e.get_TimeOfDay.
41 64 64 53 65 63 6f 6e 64 73 00 6d 5f 72 65 73 AddSeconds.m_res
6f 75 72 63 65 73 00 43 6f 70 79 45 6e 74 72 69 ources.CopyEntri
65 73 00 67 65 74 5f 49 74 65 6d 32 00 67 65 74 es.get_Item2.get
5f 49 74 65 6d 31 00 6d 5f 49 74 65 6d 32 00 6d _Item1.m_Item2.m
5f 49 74 65 6d 31 00 47 65 74 47 65 74 4d 65 74 _Item1.GetGetMet
68 6f 64 00 49 6e 74 65 72 6e 61 6c 47 65 74 53 hod.InternalGetS
79 73 74 65 6d 44 65 66 61 75 6c 74 55 49 4c 61 ystemDefaultUILa
6e 67 75 61 67 65 00 67 65 74 5f 55 73 65 72 44 nguage.get_UserD
65 66 61 75 6c 74 43 75 6c 74 75 72 65 00 67 65 efaultCulture.ge
74 5f 50 61 72 65 6e 74 00 49 6e 74 65 72 6e 61 t_Parent.Interna
6c 47 65 74 52 65 73 6f 75 72 63 65 53 65 74 00 lGetResourceSet.
53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f System.Collectio
6e 73 2e 49 53 74 72 75 63 74 75 72 61 6c 45 71 ns.IStructuralEq
75 61 74 61 62 6c 65 2e 45 71 75 61 6c 73 00 53 uatable.Equals.S
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF61013D2, Value:
67 65 74 5f 4c 61 73 74 57 72 69 74 65 54 69 6d get_LastWriteTim
65 55 74 63 00 67 65 74 5f 43 72 65 61 74 69 6f eUtc.get_Creatio
6e 54 69 6d 65 55 74 63 00 47 65 74 4f 6e 65 59 nTimeUtc.GetOneY
65 61 72 4c 6f 63 61 6c 46 72 6f 6d 55 74 63 00 earLocalFromUtc.
6d 5f 6f 6e 65 59 65 61 72 4c 6f 63 61 6c 46 72 m_oneYearLocalFr
6f 6d 55 74 63 00 47 65 74 49 73 44 61 79 6c 69 omUtc.GetIsDayli
67 68 74 53 61 76 69 6e 67 73 46 72 6f 6d 55 74 ghtSavingsFromUt
63 00 47 65 74 44 61 74 65 54 69 6d 65 4e 6f 77 c.GetDateTimeNow
55 74 63 4f 66 66 73 65 74 46 72 6f 6d 55 74 63 UtcOffsetFromUtc
00 43 6f 6e 76 65 72 74 54 69 6d 65 54 6f 55 74 .ConvertTimeToUt
63 00 67 65 74 5f 49 64 00 47 65 74 4c 6f 67 6f c.get_Id.GetLogo
6e 41 75 74 68 49 64 00 49 6e 74 65 72 6e 61 6c nAuthId.Internal
47 65 74 49 64 00 6d 5f 64 00 54 72 69 6d 48 65 GetId.m_d.TrimHe
61 64 00 49 6e 74 65 72 6e 61 6c 45 6d 75 6c 61 ad.InternalEmula
74 65 52 65 61 64 00 6d 5f 72 65 61 64 00 49 73 teRead.m_read.Is
46 69 6e 61 6c 69 7a 69 6e 67 46 6f 72 55 6e 6c FinalizingForUnl
2015-01-12 22:23:12,029 - detector - WARNING - Process BoxSync.exe (pid: 4912) matched: Njrat at address: 0x7FEF6128776, Value:
47 65 74 56 6f 6c 75 6d 65 49 6e 66 6f 72 6d 61 GetVolumeInforma
74 69 6f 6e 00 6c 70 44 79 6e 61 6d 69 63 54 69 tion.lpDynamicTi
6d 65 5a 6f 6e 65 49 6e 66 6f 72 6d 61 74 69 6f meZoneInformatio
6e 00 6c 70 54 69 6d 65 5a 6f 6e 65 49 6e 66 6f n.lpTimeZoneInfo
72 6d 61 74 69 6f 6e 00 47 65 74 54 69 6d 65 5a rmation.GetTimeZ
6f 6e 65 49 6e 66 6f 72 6d 61 74 69 6f 6e 00 64 oneInformation.d
65 66 61 75 6c 74 54 69 6d 65 5a 6f 6e 65 49 6e efaultTimeZoneIn
66 6f 72 6d 61 74 69 6f 6e 00 74 69 6d 65 5a 6f formation.timeZo
6e 65 49 6e 66 6f 72 6d 61 74 69 6f 6e 00 74 79 neInformation.ty
70 65 49 6e 66 6f 72 6d 61 74 69 6f 6e 00 6c 70 peInformation.lp
4e 6c 73 56 65 72 73 69 6f 6e 49 6e 66 6f 72 6d NlsVersionInform
61 74 69 6f 6e 00 41 75 74 68 65 6e 74 69 63 61 ation.Authentica
74 69 6f 6e 49 6e 66 6f 72 6d 61 74 69 6f 6e 00 tionInformation.
47 65 74 55 73 65 72 4f 62 6a 65 63 74 49 6e 66 GetUserObjectInf
6f 72 6d 61 74 69 6f 6e 00 73 65 63 75 72 69 74 ormation.securit
79 49 6e 66 6f 72 6d 61 74 69 6f 6e 00 6d 65 74 yInformation.met
2015-01-12 22:34:23,118 - detector - INFO - Scanning finished
2015-01-12 22:34:23,118 - detector.service - INFO - Trying to stop the winpmem service...
2015-01-12 22:34:23,118 - detector.service - INFO - Trying to delete the winpmem service...
2015-01-12 22:34:23,118 - detector - INFO - Service stopped
2015-01-12 22:34:23,118 - detector - INFO - Analysis finished
2015-01-14 17:22:21,693 - detector - INFO - Starting with process ID 696
2015-01-14 17:22:21,753 - detector - ERROR - The user is not an Administrator, aborting
2015-01-14 17:59:36,236 - detector - INFO - Starting with process ID 4080
2015-01-14 17:59:36,236 - detector - INFO - Selected Profile Name: Win7SP1x64
2015-01-14 17:59:36,236 - detector - INFO - Selected Driver: C:\Users\Admin\AppData\Local\Temp\_MEI79842\drivers\winpmem64.sys
2015-01-14 17:59:36,246 - detector.service - INFO - Launching service destroyer...
2015-01-14 17:59:36,246 - detector.service - DEBUG - Unable to OpenService: (1060, 'OpenService', 'Der angegebene Dienst ist kein installierter Dienst.')
2015-01-14 17:59:36,246 - detector.service - INFO - Trying to stop the winpmem service...
2015-01-14 17:59:36,246 - detector.service - INFO - Trying to delete the winpmem service...
2015-01-14 17:59:36,246 - detector.service - DEBUG - Unable to delete the service: (6, 'DeleteService', 'Das Handle ist ung\xfcltig.')
2015-01-14 17:59:36,446 - detector.service - INFO - Trying to start the winpmem service...
2015-01-14 17:59:36,635 - detector - INFO - Service started
2015-01-14 17:59:36,635 - detector - INFO - Selected Yara signature file at C:\Users\Admin\AppData\Local\Temp\_MEI79842\rules\signatures.yar
2015-01-14 17:59:36,635 - detector - INFO - Obtaining address space and generating config for volatility
2015-01-14 17:59:40,375 - detector - INFO - Address space: <volatility.plugins.addrspaces.amd64.AMD64PagedMemory object at 0x08820710>, Base: <volatility.plugins.addrspaces.win32pmem.Win32FileAddressSpace object at 0x07BCD050>
2015-01-14 17:59:40,375 - detector - INFO - Profile: <volatility.plugins.overlays.windows.win7.Win7SP1x64 object at 0x07BCD030>, DTB: 0x187000
2015-01-14 17:59:40,378 - detector - INFO - Starting yara scanner...
2015-01-14 19:48:13,690 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6E62B6, Value:
46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 FromBase64String
00 54 6f 42 61 73 65 36 34 53 74 72 69 6e 67 00 .ToBase64String.
55 6e 65 73 63 61 70 65 44 61 74 61 53 74 72 69 UnescapeDataStri
6e 67 00 67 65 74 5f 54 79 70 65 4f 66 53 74 72 ng.get_TypeOfStr
69 6e 67 00 75 72 69 53 74 72 69 6e 67 00 67 65 ing.uriString.ge
74 5f 4f 72 69 67 69 6e 61 6c 53 74 72 69 6e 67 t_OriginalString
00 67 65 74 5f 4f 62 6a 65 63 74 54 6f 53 74 72 .get_ObjectToStr
69 6e 67 00 67 65 74 5f 4d 61 78 4f 63 63 75 72 ing.get_MaxOccur
73 53 74 72 69 6e 67 00 73 65 74 5f 4d 61 78 4f sString.set_MaxO
63 63 75 72 73 53 74 72 69 6e 67 00 66 6f 72 6d ccursString.form
61 74 53 74 72 69 6e 67 00 67 65 74 5f 41 73 73 atString.get_Ass
65 6d 62 6c 79 53 74 72 69 6e 67 00 61 73 73 65 emblyString.asse
6d 62 6c 79 53 74 72 69 6e 67 00 75 72 69 44 69 mblyString.uriDi
63 74 69 6f 6e 61 72 79 53 74 72 69 6e 67 00 53 ctionaryString.S
75 62 73 74 72 69 6e 67 00 58 6d 6c 53 63 68 65 ubstring.XmlSche
6d 61 43 6f 6e 74 65 6e 74 50 72 6f 63 65 73 73 maContentProcess
2015-01-14 19:48:13,700 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA71063F, Value:
46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 FromBase64String
00 54 6f 42 61 73 65 36 34 53 74 72 69 6e 67 00 .ToBase64String.
74 79 70 65 53 74 72 69 6e 67 00 57 72 69 74 65 typeString.Write
41 74 74 72 69 62 75 74 65 53 74 72 69 6e 67 00 AttributeString.
67 65 74 5f 4c 6f 63 61 74 69 6f 6e 54 61 67 58 get_LocationTagX
6d 6c 53 74 72 69 6e 67 00 46 72 6f 6d 58 6d 6c mlString.FromXml
53 74 72 69 6e 67 00 54 6f 58 6d 6c 53 74 72 69 String.ToXmlStri
6e 67 00 5f 70 72 6f 70 43 6f 6e 6e 65 63 74 69 ng._propConnecti
6f 6e 53 74 72 69 6e 67 00 63 6f 6e 6e 65 63 74 onString.connect
69 6f 6e 53 74 72 69 6e 67 00 72 65 73 6f 6c 75 ionString.resolu
74 69 6f 6e 41 73 53 74 72 69 6e 67 00 43 6f 6e tionAsString.Con
76 65 72 74 46 72 6f 6d 49 6e 76 61 72 69 61 6e vertFromInvarian
74 53 74 72 69 6e 67 00 43 6f 6e 76 65 72 74 54 tString.ConvertT
6f 49 6e 76 61 72 69 61 6e 74 53 74 72 69 6e 67 oInvariantString
00 53 75 62 73 74 72 69 6e 67 00 74 68 72 6f 77 .Substring.throw
49 66 4d 69 73 73 69 6e 67 00 73 65 74 5f 46 6f IfMissing.set_Fo
2015-01-14 19:48:13,700 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA733BC5, Value:
46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 FromBase64String
00 54 6f 42 61 73 65 36 34 53 74 72 69 6e 67 00 .ToBase64String.
71 75 6f 74 61 45 78 63 65 65 64 65 64 53 74 72 quotaExceededStr
69 6e 67 00 57 72 69 74 65 41 74 74 72 69 62 75 ing.WriteAttribu
74 65 53 74 72 69 6e 67 00 49 73 57 65 6c 6c 46 teString.IsWellF
6f 72 6d 65 64 55 72 69 53 74 72 69 6e 67 00 75 ormedUriString.u
72 69 53 74 72 69 6e 67 00 67 65 74 5f 4f 72 69 riString.get_Ori
67 69 6e 61 6c 53 74 72 69 6e 67 00 46 72 6f 6d ginalString.From
58 6d 6c 53 74 72 69 6e 67 00 54 6f 58 6d 6c 53 XmlString.ToXmlS
74 72 69 6e 67 00 5f 74 6f 6b 65 6e 53 74 72 69 tring._tokenStri
6e 67 00 52 65 61 64 45 6c 65 6d 65 6e 74 43 6f ng.ReadElementCo
6e 74 65 6e 74 41 73 53 74 72 69 6e 67 00 66 6f ntentAsString.fo
72 6d 61 74 53 74 72 69 6e 67 00 57 72 69 74 65 rmatString.Write
45 6c 65 6d 65 6e 74 53 74 72 69 6e 67 00 6f 75 ElementString.ou
74 70 75 74 53 74 72 69 6e 67 00 68 65 78 53 74 tputString.hexSt
72 69 6e 67 00 73 69 67 6e 61 74 75 72 65 4d 65 ring.signatureMe
2015-01-14 19:48:13,700 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA74B7FF, Value:
46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 FromBase64String
00 53 65 63 75 72 65 53 74 72 69 6e 67 00 45 76 .SecureString.Ev
65 6e 74 57 72 69 74 65 53 74 72 69 6e 67 00 57 entWriteString.W
72 69 74 65 41 74 74 72 69 62 75 74 65 53 74 72 riteAttributeStr
69 6e 67 00 5f 78 6d 6c 53 74 72 69 6e 67 00 70 ing._xmlString.p
69 70 65 48 61 6e 64 6c 65 41 73 53 74 72 69 6e ipeHandleAsStrin
67 00 41 72 67 75 6d 65 6e 74 5f 4d 61 70 4e 61 g.Argument_MapNa
6d 65 45 6d 70 74 79 53 74 72 69 6e 67 00 53 75 meEmptyString.Su
62 73 74 72 69 6e 67 00 64 69 73 70 6f 73 69 6e bstring.disposin
67 00 73 65 74 5f 44 74 64 50 72 6f 63 65 73 73 g.set_DtdProcess
69 6e 67 00 67 65 74 5f 43 6f 6c 6c 65 63 74 69 ing.get_Collecti
6f 6e 4d 6f 64 69 66 69 65 64 57 68 69 6c 65 45 onModifiedWhileE
6e 75 6d 65 72 61 74 69 6e 67 00 6d 5f 70 72 6f numerating.m_pro
64 75 63 65 72 49 73 57 61 69 74 69 6e 67 00 6d ducerIsWaiting.m
5f 63 6f 6e 73 75 6d 65 72 49 73 57 61 69 74 69 _consumerIsWaiti
6e 67 00 53 79 73 74 65 6d 2e 52 75 6e 74 69 6d ng.System.Runtim
2015-01-14 19:48:13,700 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6E62BA, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 54 6f 42 Base64String.ToB
61 73 65 36 34 53 74 72 69 6e 67 00 55 6e 65 73 ase64String.Unes
63 61 70 65 44 61 74 61 53 74 72 69 6e 67 00 67 capeDataString.g
65 74 5f 54 79 70 65 4f 66 53 74 72 69 6e 67 00 et_TypeOfString.
75 72 69 53 74 72 69 6e 67 00 67 65 74 5f 4f 72 uriString.get_Or
69 67 69 6e 61 6c 53 74 72 69 6e 67 00 67 65 74 iginalString.get
5f 4f 62 6a 65 63 74 54 6f 53 74 72 69 6e 67 00 _ObjectToString.
67 65 74 5f 4d 61 78 4f 63 63 75 72 73 53 74 72 get_MaxOccursStr
69 6e 67 00 73 65 74 5f 4d 61 78 4f 63 63 75 72 ing.set_MaxOccur
73 53 74 72 69 6e 67 00 66 6f 72 6d 61 74 53 74 sString.formatSt
72 69 6e 67 00 67 65 74 5f 41 73 73 65 6d 62 6c ring.get_Assembl
79 53 74 72 69 6e 67 00 61 73 73 65 6d 62 6c 79 yString.assembly
53 74 72 69 6e 67 00 75 72 69 44 69 63 74 69 6f String.uriDictio
6e 61 72 79 53 74 72 69 6e 67 00 53 75 62 73 74 naryString.Subst
72 69 6e 67 00 58 6d 6c 53 63 68 65 6d 61 43 6f ring.XmlSchemaCo
6e 74 65 6e 74 50 72 6f 63 65 73 73 69 6e 67 00 ntentProcessing.
2015-01-14 19:48:13,710 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6E62C9, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 55 6e 65 Base64String.Une
73 63 61 70 65 44 61 74 61 53 74 72 69 6e 67 00 scapeDataString.
67 65 74 5f 54 79 70 65 4f 66 53 74 72 69 6e 67 get_TypeOfString
00 75 72 69 53 74 72 69 6e 67 00 67 65 74 5f 4f .uriString.get_O
72 69 67 69 6e 61 6c 53 74 72 69 6e 67 00 67 65 riginalString.ge
74 5f 4f 62 6a 65 63 74 54 6f 53 74 72 69 6e 67 t_ObjectToString
00 67 65 74 5f 4d 61 78 4f 63 63 75 72 73 53 74 .get_MaxOccursSt
72 69 6e 67 00 73 65 74 5f 4d 61 78 4f 63 63 75 ring.set_MaxOccu
72 73 53 74 72 69 6e 67 00 66 6f 72 6d 61 74 53 rsString.formatS
74 72 69 6e 67 00 67 65 74 5f 41 73 73 65 6d 62 tring.get_Assemb
6c 79 53 74 72 69 6e 67 00 61 73 73 65 6d 62 6c lyString.assembl
79 53 74 72 69 6e 67 00 75 72 69 44 69 63 74 69 yString.uriDicti
6f 6e 61 72 79 53 74 72 69 6e 67 00 53 75 62 73 onaryString.Subs
74 72 69 6e 67 00 58 6d 6c 53 63 68 65 6d 61 43 tring.XmlSchemaC
6f 6e 74 65 6e 74 50 72 6f 63 65 73 73 69 6e 67 ontentProcessing
00 49 6e 76 6f 6b 65 4f 6e 53 65 72 69 61 6c 69 .InvokeOnSeriali
2015-01-14 19:48:13,710 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6FB264, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 57 72 69 Base64String.Wri
74 65 45 6e 64 45 6c 65 6d 65 6e 74 00 67 65 74 teEndElement.get
5f 52 61 6e 6b 00 53 79 6e 63 68 72 6f 6e 69 7a _Rank.Synchroniz
65 64 00 67 65 74 5f 42 61 73 65 54 79 70 65 00 ed.get_BaseType.
47 65 74 49 6e 74 65 72 66 61 63 65 73 00 53 79 GetInterfaces.Sy
73 74 65 6d 2e 52 75 6e 74 69 6d 65 2e 52 65 6d stem.Runtime.Rem
6f 74 69 6e 67 00 52 65 6d 6f 74 69 6e 67 53 65 oting.RemotingSe
72 76 69 63 65 73 00 4f 62 6a 52 65 66 00 44 69 rvices.ObjRef.Di
73 63 6f 6e 6e 65 63 74 00 67 65 74 5f 44 79 6e sconnect.get_Dyn
61 6d 69 63 44 69 72 65 63 74 6f 72 79 00 67 65 amicDirectory.ge
74 5f 4c 6f 63 61 6c 4e 61 6d 65 00 47 65 74 41 t_LocalName.GetA
74 74 72 69 62 75 74 65 00 67 65 74 5f 43 68 69 ttribute.get_Chi
6c 64 4e 6f 64 65 73 00 58 6d 6c 4e 6f 64 65 54 ldNodes.XmlNodeT
79 70 65 00 67 65 74 5f 4e 6f 64 65 54 79 70 65 ype.get_NodeType
00 67 65 74 5f 4f 77 6e 65 72 44 6f 63 75 6d 65 .get_OwnerDocume
6e 74 00 50 72 6f 70 65 72 74 79 49 6e 66 6f 00 nt.PropertyInfo.
2015-01-14 19:48:13,710 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA710643, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 54 6f 42 Base64String.ToB
61 73 65 36 34 53 74 72 69 6e 67 00 74 79 70 65 ase64String.type
53 74 72 69 6e 67 00 57 72 69 74 65 41 74 74 72 String.WriteAttr
69 62 75 74 65 53 74 72 69 6e 67 00 67 65 74 5f ibuteString.get_
4c 6f 63 61 74 69 6f 6e 54 61 67 58 6d 6c 53 74 LocationTagXmlSt
72 69 6e 67 00 46 72 6f 6d 58 6d 6c 53 74 72 69 ring.FromXmlStri
6e 67 00 54 6f 58 6d 6c 53 74 72 69 6e 67 00 5f ng.ToXmlString._
70 72 6f 70 43 6f 6e 6e 65 63 74 69 6f 6e 53 74 propConnectionSt
72 69 6e 67 00 63 6f 6e 6e 65 63 74 69 6f 6e 53 ring.connectionS
74 72 69 6e 67 00 72 65 73 6f 6c 75 74 69 6f 6e tring.resolution
41 73 53 74 72 69 6e 67 00 43 6f 6e 76 65 72 74 AsString.Convert
46 72 6f 6d 49 6e 76 61 72 69 61 6e 74 53 74 72 FromInvariantStr
69 6e 67 00 43 6f 6e 76 65 72 74 54 6f 49 6e 76 ing.ConvertToInv
61 72 69 61 6e 74 53 74 72 69 6e 67 00 53 75 62 ariantString.Sub
73 74 72 69 6e 67 00 74 68 72 6f 77 49 66 4d 69 string.throwIfMi
73 73 69 6e 67 00 73 65 74 5f 46 6f 72 6d 61 74 ssing.set_Format
2015-01-14 19:48:13,710 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA710652, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 74 79 70 Base64String.typ
65 53 74 72 69 6e 67 00 57 72 69 74 65 41 74 74 eString.WriteAtt
72 69 62 75 74 65 53 74 72 69 6e 67 00 67 65 74 ributeString.get
5f 4c 6f 63 61 74 69 6f 6e 54 61 67 58 6d 6c 53 _LocationTagXmlS
74 72 69 6e 67 00 46 72 6f 6d 58 6d 6c 53 74 72 tring.FromXmlStr
69 6e 67 00 54 6f 58 6d 6c 53 74 72 69 6e 67 00 ing.ToXmlString.
5f 70 72 6f 70 43 6f 6e 6e 65 63 74 69 6f 6e 53 _propConnectionS
74 72 69 6e 67 00 63 6f 6e 6e 65 63 74 69 6f 6e tring.connection
53 74 72 69 6e 67 00 72 65 73 6f 6c 75 74 69 6f String.resolutio
6e 41 73 53 74 72 69 6e 67 00 43 6f 6e 76 65 72 nAsString.Conver
74 46 72 6f 6d 49 6e 76 61 72 69 61 6e 74 53 74 tFromInvariantSt
72 69 6e 67 00 43 6f 6e 76 65 72 74 54 6f 49 6e ring.ConvertToIn
76 61 72 69 61 6e 74 53 74 72 69 6e 67 00 53 75 variantString.Su
62 73 74 72 69 6e 67 00 74 68 72 6f 77 49 66 4d bstring.throwIfM
69 73 73 69 6e 67 00 73 65 74 5f 46 6f 72 6d 61 issing.set_Forma
74 74 69 6e 67 00 67 65 74 5f 4f 76 65 72 72 69 tting.get_Overri
2015-01-14 19:48:13,710 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA733BC9, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 54 6f 42 Base64String.ToB
61 73 65 36 34 53 74 72 69 6e 67 00 71 75 6f 74 ase64String.quot
61 45 78 63 65 65 64 65 64 53 74 72 69 6e 67 00 aExceededString.
57 72 69 74 65 41 74 74 72 69 62 75 74 65 53 74 WriteAttributeSt
72 69 6e 67 00 49 73 57 65 6c 6c 46 6f 72 6d 65 ring.IsWellForme
64 55 72 69 53 74 72 69 6e 67 00 75 72 69 53 74 dUriString.uriSt
72 69 6e 67 00 67 65 74 5f 4f 72 69 67 69 6e 61 ring.get_Origina
6c 53 74 72 69 6e 67 00 46 72 6f 6d 58 6d 6c 53 lString.FromXmlS
74 72 69 6e 67 00 54 6f 58 6d 6c 53 74 72 69 6e tring.ToXmlStrin
67 00 5f 74 6f 6b 65 6e 53 74 72 69 6e 67 00 52 g._tokenString.R
65 61 64 45 6c 65 6d 65 6e 74 43 6f 6e 74 65 6e eadElementConten
74 41 73 53 74 72 69 6e 67 00 66 6f 72 6d 61 74 tAsString.format
53 74 72 69 6e 67 00 57 72 69 74 65 45 6c 65 6d String.WriteElem
65 6e 74 53 74 72 69 6e 67 00 6f 75 74 70 75 74 entString.output
53 74 72 69 6e 67 00 68 65 78 53 74 72 69 6e 67 String.hexString
00 73 69 67 6e 61 74 75 72 65 4d 65 74 68 6f 64 .signatureMethod
2015-01-14 19:48:13,720 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA733BD8, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 71 75 6f Base64String.quo
74 61 45 78 63 65 65 64 65 64 53 74 72 69 6e 67 taExceededString
00 57 72 69 74 65 41 74 74 72 69 62 75 74 65 53 .WriteAttributeS
74 72 69 6e 67 00 49 73 57 65 6c 6c 46 6f 72 6d tring.IsWellForm
65 64 55 72 69 53 74 72 69 6e 67 00 75 72 69 53 edUriString.uriS
74 72 69 6e 67 00 67 65 74 5f 4f 72 69 67 69 6e tring.get_Origin
61 6c 53 74 72 69 6e 67 00 46 72 6f 6d 58 6d 6c alString.FromXml
53 74 72 69 6e 67 00 54 6f 58 6d 6c 53 74 72 69 String.ToXmlStri
6e 67 00 5f 74 6f 6b 65 6e 53 74 72 69 6e 67 00 ng._tokenString.
52 65 61 64 45 6c 65 6d 65 6e 74 43 6f 6e 74 65 ReadElementConte
6e 74 41 73 53 74 72 69 6e 67 00 66 6f 72 6d 61 ntAsString.forma
74 53 74 72 69 6e 67 00 57 72 69 74 65 45 6c 65 tString.WriteEle
6d 65 6e 74 53 74 72 69 6e 67 00 6f 75 74 70 75 mentString.outpu
74 53 74 72 69 6e 67 00 68 65 78 53 74 72 69 6e tString.hexStrin
67 00 73 69 67 6e 61 74 75 72 65 4d 65 74 68 6f g.signatureMetho
64 44 69 63 74 69 6f 6e 61 72 79 53 74 72 69 6e dDictionaryStrin
2015-01-14 19:48:13,720 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA74B803, Value:
42 61 73 65 36 34 53 74 72 69 6e 67 00 53 65 63 Base64String.Sec
75 72 65 53 74 72 69 6e 67 00 45 76 65 6e 74 57 ureString.EventW
72 69 74 65 53 74 72 69 6e 67 00 57 72 69 74 65 riteString.Write
41 74 74 72 69 62 75 74 65 53 74 72 69 6e 67 00 AttributeString.
5f 78 6d 6c 53 74 72 69 6e 67 00 70 69 70 65 48 _xmlString.pipeH
61 6e 64 6c 65 41 73 53 74 72 69 6e 67 00 41 72 andleAsString.Ar
67 75 6d 65 6e 74 5f 4d 61 70 4e 61 6d 65 45 6d gument_MapNameEm
70 74 79 53 74 72 69 6e 67 00 53 75 62 73 74 72 ptyString.Substr
69 6e 67 00 64 69 73 70 6f 73 69 6e 67 00 73 65 ing.disposing.se
74 5f 44 74 64 50 72 6f 63 65 73 73 69 6e 67 00 t_DtdProcessing.
67 65 74 5f 43 6f 6c 6c 65 63 74 69 6f 6e 4d 6f get_CollectionMo
64 69 66 69 65 64 57 68 69 6c 65 45 6e 75 6d 65 difiedWhileEnume
72 61 74 69 6e 67 00 6d 5f 70 72 6f 64 75 63 65 rating.m_produce
72 49 73 57 61 69 74 69 6e 67 00 6d 5f 63 6f 6e rIsWaiting.m_con
73 75 6d 65 72 49 73 57 61 69 74 69 6e 67 00 53 sumerIsWaiting.S
79 73 74 65 6d 2e 52 75 6e 74 69 6d 65 2e 52 65 ystem.Runtime.Re
2015-01-14 19:48:13,720 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA7431DB, Value:
43 6f 6e 6e 65 63 74 65 64 00 49 6e 76 61 6c 69 Connected.Invali
64 4f 70 65 72 61 74 69 6f 6e 5f 50 69 70 65 41 dOperation_PipeA
6c 72 65 61 64 79 43 6f 6e 6e 65 63 74 65 64 00 lreadyConnected.
49 6e 76 61 6c 69 64 4f 70 65 72 61 74 69 6f 6e InvalidOperation
5f 50 69 70 65 41 6c 72 65 61 64 79 44 69 73 63 _PipeAlreadyDisc
6f 6e 6e 65 63 74 65 64 00 67 65 74 5f 49 73 43 onnected.get_IsC
6f 6d 70 6c 65 74 65 64 00 67 65 74 5f 49 73 4c ompleted.get_IsL
69 66 74 65 64 00 45 76 74 43 68 61 6e 6e 65 6c ifted.EvtChannel
52 65 66 65 72 65 6e 63 65 49 6d 70 6f 72 74 65 ReferenceImporte
64 00 67 65 74 5f 49 73 49 6d 70 6f 72 74 65 64 d.get_IsImported
00 48 6f 69 73 74 65 64 00 43 65 72 74 69 66 69 .Hoisted.Certifi
63 61 74 65 4e 6f 74 45 78 70 6c 69 63 69 74 6c cateNotExplicitl
79 54 72 75 73 74 65 64 00 55 6e 74 72 75 73 74 yTrusted.Untrust
65 64 00 43 65 72 74 69 66 69 63 61 74 65 45 78 ed.CertificateEx
70 6c 69 63 69 74 6c 79 44 69 73 74 72 75 73 74 plicitlyDistrust
65 64 00 42 61 73 69 63 43 6f 6e 73 74 72 61 69 ed.BasicConstrai
2015-01-14 19:48:13,720 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA743201, Value:
43 6f 6e 6e 65 63 74 65 64 00 49 6e 76 61 6c 69 Connected.Invali
64 4f 70 65 72 61 74 69 6f 6e 5f 50 69 70 65 41 dOperation_PipeA
6c 72 65 61 64 79 44 69 73 63 6f 6e 6e 65 63 74 lreadyDisconnect
65 64 00 67 65 74 5f 49 73 43 6f 6d 70 6c 65 74 ed.get_IsComplet
65 64 00 67 65 74 5f 49 73 4c 69 66 74 65 64 00 ed.get_IsLifted.
45 76 74 43 68 61 6e 6e 65 6c 52 65 66 65 72 65 EvtChannelRefere
6e 63 65 49 6d 70 6f 72 74 65 64 00 67 65 74 5f nceImported.get_
49 73 49 6d 70 6f 72 74 65 64 00 48 6f 69 73 74 IsImported.Hoist
65 64 00 43 65 72 74 69 66 69 63 61 74 65 4e 6f ed.CertificateNo
74 45 78 70 6c 69 63 69 74 6c 79 54 72 75 73 74 tExplicitlyTrust
65 64 00 55 6e 74 72 75 73 74 65 64 00 43 65 72 ed.Untrusted.Cer
74 69 66 69 63 61 74 65 45 78 70 6c 69 63 69 74 tificateExplicit
6c 79 44 69 73 74 72 75 73 74 65 64 00 42 61 73 lyDistrusted.Bas
69 63 43 6f 6e 73 74 72 61 69 6e 74 73 4e 6f 74 icConstraintsNot
4f 62 73 65 72 76 65 64 00 72 65 73 65 72 76 65 Observed.reserve
64 00 43 65 72 74 69 66 69 63 61 74 65 55 73 61 d.CertificateUsa
2015-01-14 19:48:13,720 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA749016, Value:
43 6f 6e 6e 65 63 74 65 64 00 69 73 43 6f 6e 6e Connected.isConn
65 63 74 65 64 00 69 73 49 6e 68 65 72 69 74 65 ected.isInherite
64 00 49 73 50 61 74 68 52 6f 6f 74 65 64 00 67 d.IsPathRooted.g
65 74 5f 50 4c 49 4e 51 5f 43 6f 6d 6d 6f 6e 45 et_PLINQ_CommonE
6e 75 6d 65 72 61 74 6f 72 5f 43 75 72 72 65 6e numerator_Curren
74 5f 4e 6f 74 53 74 61 72 74 65 64 00 69 73 49 t_NotStarted.isI
6d 70 6f 72 74 65 64 00 67 65 74 5f 42 43 72 79 mported.get_BCry
70 74 53 75 70 70 6f 72 74 65 64 00 67 65 74 5f ptSupported.get_
4e 43 72 79 70 74 53 75 70 70 6f 72 74 65 64 00 NCryptSupported.
67 65 74 5f 50 4c 49 4e 51 5f 44 69 73 70 6f 73 get_PLINQ_Dispos
65 52 65 71 75 65 73 74 65 64 00 67 65 74 5f 50 eRequested.get_P
4c 49 4e 51 5f 45 78 74 65 72 6e 61 6c 43 61 6e LINQ_ExternalCan
63 65 6c 6c 61 74 69 6f 6e 52 65 71 75 65 73 74 cellationRequest
65 64 00 67 65 74 5f 49 73 43 61 6e 63 65 6c 6c ed.get_IsCancell
61 74 69 6f 6e 52 65 71 75 65 73 74 65 64 00 65 ationRequested.e
78 69 73 74 65 64 00 57 72 61 70 50 61 72 74 69 xisted.WrapParti
2015-01-14 19:48:13,730 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA749022, Value:
43 6f 6e 6e 65 63 74 65 64 00 69 73 49 6e 68 65 Connected.isInhe
72 69 74 65 64 00 49 73 50 61 74 68 52 6f 6f 74 rited.IsPathRoot
65 64 00 67 65 74 5f 50 4c 49 4e 51 5f 43 6f 6d ed.get_PLINQ_Com
6d 6f 6e 45 6e 75 6d 65 72 61 74 6f 72 5f 43 75 monEnumerator_Cu
72 72 65 6e 74 5f 4e 6f 74 53 74 61 72 74 65 64 rrent_NotStarted
00 69 73 49 6d 70 6f 72 74 65 64 00 67 65 74 5f .isImported.get_
42 43 72 79 70 74 53 75 70 70 6f 72 74 65 64 00 BCryptSupported.
67 65 74 5f 4e 43 72 79 70 74 53 75 70 70 6f 72 get_NCryptSuppor
74 65 64 00 67 65 74 5f 50 4c 49 4e 51 5f 44 69 ted.get_PLINQ_Di
73 70 6f 73 65 52 65 71 75 65 73 74 65 64 00 67 sposeRequested.g
65 74 5f 50 4c 49 4e 51 5f 45 78 74 65 72 6e 61 et_PLINQ_Externa
6c 43 61 6e 63 65 6c 6c 61 74 69 6f 6e 52 65 71 lCancellationReq
75 65 73 74 65 64 00 67 65 74 5f 49 73 43 61 6e uested.get_IsCan
63 65 6c 6c 61 74 69 6f 6e 52 65 71 75 65 73 74 cellationRequest
65 64 00 65 78 69 73 74 65 64 00 57 72 61 70 50 ed.existed.WrapP
61 72 74 69 74 69 6f 6e 65 64 53 74 72 65 61 6d artitionedStream
2015-01-14 19:48:13,730 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6DB752, Value:
52 65 63 65 69 76 65 00 50 72 69 76 61 74 65 50 Receive.PrivateP
72 69 6d 69 74 69 76 65 00 4f 74 68 65 72 46 72 rimitive.OtherFr
61 6d 65 77 6f 72 6b 50 72 69 6d 69 74 69 76 65 ameworkPrimitive
00 4f 74 68 65 72 49 6e 74 65 72 6e 61 6c 50 72 .OtherInternalPr
69 6d 69 74 69 76 65 00 53 79 73 74 65 6d 2e 43 imitive.System.C
6f 6c 6c 65 63 74 69 6f 6e 73 2e 49 44 69 63 74 ollections.IDict
69 6f 6e 61 72 79 2e 52 65 6d 6f 76 65 00 67 65 ionary.Remove.ge
74 5f 42 75 66 66 65 72 53 69 7a 65 00 52 65 69 t_BufferSize.Rei
6e 69 74 69 61 6c 69 7a 65 00 43 6f 6d 6d 75 6e nitialize.Commun
69 63 61 74 69 6f 6e 4f 62 6a 65 63 74 54 68 72 icationObjectThr
6f 77 49 66 00 4d 65 73 73 61 67 65 4c 6f 67 67 owIf.MessageLogg
69 6e 67 4f 66 66 00 57 61 69 74 41 6e 64 42 61 ingOff.WaitAndBa
63 6b 6f 66 66 00 50 65 72 66 00 45 76 65 6e 74 ckoff.Perf.Event
54 6f 6f 42 69 67 00 46 61 69 6c 65 64 54 6f 53 TooBig.FailedToS
65 74 75 70 54 72 61 63 69 6e 67 00 53 69 67 6e etupTracing.Sign
61 6c 50 65 6e 64 69 6e 67 00 4d 65 73 73 61 67 alPending.Messag
2015-01-14 19:48:13,730 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA7264F5, Value:
52 65 63 65 69 76 65 72 53 65 63 75 72 69 74 79 ReceiverSecurity
54 6f 6b 65 6e 00 57 69 66 53 69 67 6e 65 64 49 Token.WifSignedI
6e 66 6f 00 44 65 6c 65 67 61 74 69 6e 67 58 6d nfo.DelegatingXm
6c 44 69 63 74 69 6f 6e 61 72 79 57 72 69 74 65 lDictionaryWrite
72 00 49 6e 76 61 6c 69 64 4e 74 4d 61 70 70 69 r.InvalidNtMappi
6e 67 00 53 61 66 65 43 65 72 74 53 74 6f 72 65 ng.SafeCertStore
48 61 6e 64 6c 65 00 57 72 69 74 65 42 69 6e 61 Handle.WriteBina
72 79 45 78 63 68 61 6e 67 65 00 73 65 74 5f 55 ryExchange.set_U
73 65 4b 65 79 00 45 78 63 6c 75 73 69 76 65 43 seKey.ExclusiveC
31 34 4e 53 74 72 69 6e 67 73 00 41 73 79 6e 63 14NStrings.Async
68 72 6f 6e 6f 75 73 4f 70 65 72 61 74 69 6f 6e hronousOperation
45 78 63 65 70 74 69 6f 6e 00 4c 69 66 65 53 70 Exception.LifeSp
61 6e 5f 53 74 72 75 63 74 00 4c 6f 63 61 6c 69 an_Struct.Locali
7a 65 64 45 6e 74 72 79 00 57 72 69 74 65 53 75 zedEntry.WriteSu
62 6a 65 63 74 4b 65 79 49 6e 66 6f 00 55 73 65 bjectKeyInfo.Use
72 4e 61 6d 65 43 6c 61 69 6d 53 65 74 00 53 61 rNameClaimSet.Sa
2015-01-14 19:48:13,730 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA727AFB, Value:
52 65 63 65 69 76 65 64 45 6e 63 72 79 70 74 69 ReceivedEncrypti
6e 67 43 72 65 64 65 6e 74 69 61 6c 73 00 49 53 ngCredentials.IS
69 67 6e 61 74 75 72 65 56 61 6c 75 65 53 65 63 ignatureValueSec
75 72 69 74 79 45 6c 65 6d 65 6e 74 00 53 61 6d urityElement.Sam
6c 53 65 63 75 72 69 74 79 54 6f 6b 65 6e 00 2e lSecurityToken..
63 74 6f 72 00 44 65 62 75 67 67 69 6e 67 4d 6f ctor.DebuggingMo
64 65 73 00 53 65 63 75 72 69 74 79 52 75 6c 65 des.SecurityRule
53 65 74 00 53 79 73 74 65 6d 2e 49 64 65 6e 74 Set.System.Ident
69 74 79 4d 6f 64 65 6c 2e 43 6c 61 69 6d 73 00 ityModel.Claims.
54 72 79 43 72 65 61 74 65 57 69 6e 64 6f 77 73 TryCreateWindows
53 69 64 43 6c 61 69 6d 00 53 79 73 74 65 6d 2e SidClaim.System.
53 65 63 75 72 69 74 79 2e 50 72 69 6e 63 69 70 Security.Princip
61 6c 00 53 65 63 75 72 69 74 79 49 64 65 6e 74 al.SecurityIdent
69 66 69 65 72 00 3c 50 72 69 76 61 74 65 49 6d ifier.<PrivateIm
70 6c 65 6d 65 6e 74 61 74 69 6f 6e 44 65 74 61 plementationDeta
69 6c 73 3e 7b 31 44 43 41 32 30 41 34 2d 45 35 ils>{1DCA20A4-E5
2015-01-14 19:48:13,730 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA7446D4, Value:
52 65 63 65 69 76 65 00 41 73 73 6f 63 69 61 74 Receive.Associat
69 76 65 00 41 64 6d 69 6e 69 73 74 72 61 74 69 ive.Administrati
76 65 00 41 73 73 6f 63 69 61 74 69 76 65 43 6f ve.AssociativeCo
6d 6d 75 74 61 74 69 76 65 00 4d 75 6c 74 69 54 mmutative.MultiT
69 6d 65 72 50 65 72 63 65 6e 74 61 67 65 41 63 imerPercentageAc
74 69 76 65 00 4d 75 6c 74 69 54 69 6d 65 72 50 tive.MultiTimerP
65 72 63 65 6e 74 61 67 65 4e 6f 74 41 63 74 69 ercentageNotActi
76 65 00 63 62 53 69 7a 65 00 53 69 6e 67 6c 65 ve.cbSize.Single
46 69 6c 65 42 6f 75 6e 64 65 64 53 69 7a 65 00 FileBoundedSize.
53 69 6e 67 6c 65 46 69 6c 65 55 6e 62 6f 75 6e SingleFileUnboun
64 65 64 53 69 7a 65 00 67 65 74 5f 46 69 6c 65 dedSize.get_File
53 69 7a 65 00 45 76 74 4c 6f 67 46 69 6c 65 53 Size.EvtLogFileS
69 7a 65 00 67 65 74 5f 4d 61 78 69 6d 75 6d 46 ize.get_MaximumF
69 6c 65 53 69 7a 65 00 67 65 74 5f 42 61 74 63 ileSize.get_Batc
68 53 69 7a 65 00 73 65 74 5f 42 61 74 63 68 53 hSize.set_BatchS
69 7a 65 00 48 61 73 68 53 69 7a 65 00 67 65 74 ize.HashSize.get
2015-01-14 19:48:13,740 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6DAB51, Value:
53 65 6e 64 00 53 75 73 70 65 6e 64 00 67 65 74 Send.Suspend.get
5f 4b 69 6e 64 00 73 65 74 5f 4b 69 6e 64 00 54 _Kind.set_Kind.T
68 75 6d 62 50 72 69 6e 74 4e 6f 74 46 6f 75 6e humbPrintNotFoun
64 00 67 65 74 5f 52 65 6c 65 61 73 65 4d 65 74 d.get_ReleaseMet
68 6f 64 00 73 65 74 5f 52 65 6c 65 61 73 65 4d hod.set_ReleaseM
65 74 68 6f 64 00 67 65 74 5f 43 61 6e 63 65 6c ethod.get_Cancel
4d 65 74 68 6f 64 00 73 65 74 5f 43 61 6e 63 65 Method.set_Cance
6c 4d 65 74 68 6f 64 00 43 6f 6c 6c 65 63 74 69 lMethod.Collecti
6f 6e 73 53 68 6f 75 6c 64 49 6d 70 6c 65 6d 65 onsShouldImpleme
6e 74 47 65 6e 65 72 69 63 49 6e 74 65 72 66 61 ntGenericInterfa
63 65 00 67 65 74 5f 54 72 61 63 65 00 53 68 6f ce.get_Trace.Sho
75 6c 64 54 72 61 63 65 00 53 68 61 72 69 6e 67 uldTrace.Sharing
53 65 72 76 69 63 65 00 50 65 72 66 6f 72 6d 61 Service.Performa
6e 63 65 00 54 72 79 41 64 64 52 65 66 65 72 65 nce.TryAddRefere
6e 63 65 00 49 6e 74 65 72 6e 61 6c 52 65 6c 65 nce.InternalRele
61 73 65 52 65 66 65 72 65 6e 63 65 00 67 65 74 aseReference.get
2015-01-14 19:48:13,740 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6DEDDB, Value:
53 65 6e 64 4f 72 50 6f 73 74 43 61 6c 6c 62 61 SendOrPostCallba
63 6b 00 69 6e 76 6f 6b 65 57 69 74 68 6f 75 74 ck.invokeWithout
43 6f 6e 74 65 78 74 43 61 6c 6c 62 61 63 6b 00 ContextCallback.
65 74 77 43 61 6c 6c 62 61 63 6b 00 66 75 6c 6c etwCallback.full
43 68 65 63 6b 00 67 65 74 5f 54 68 69 73 4c 6f Check.get_ThisLo
63 6b 00 74 68 69 73 4c 6f 63 6b 00 67 65 74 5f ck.thisLock.get_
52 61 6e 6b 00 68 69 67 68 57 61 74 65 72 6d 61 Rank.highWaterma
72 6b 00 6c 6f 77 57 61 74 65 72 6d 61 72 6b 00 rk.lowWatermark.
77 61 74 65 72 6d 61 72 6b 00 67 65 74 5f 53 6c watermark.get_Sl
6f 74 4d 61 73 6b 00 4d 61 72 73 68 61 6c 00 44 otMask.Marshal.D
65 63 69 6d 61 6c 00 53 79 73 74 65 6d 2e 53 65 ecimal.System.Se
63 75 72 69 74 79 2e 50 72 69 6e 63 69 70 61 6c curity.Principal
00 6f 70 5f 47 72 65 61 74 65 72 54 68 61 6e 4f .op_GreaterThanO
72 45 71 75 61 6c 00 6f 70 5f 4c 65 73 73 54 68 rEqual.op_LessTh
61 6e 4f 72 45 71 75 61 6c 00 53 79 73 74 65 6d anOrEqual.System
2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 4f 62 6a .Collections.Obj
2015-01-14 19:48:13,740 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6E1D31, Value:
53 65 6e 64 4f 72 50 6f 73 74 54 68 75 6e 6b 00 SendOrPostThunk.
4f 6e 44 6f 57 6f 72 6b 00 64 6f 57 6f 72 6b 00 OnDoWork.doWork.
61 6c 6c 4b 65 79 77 6f 72 64 4d 61 73 6b 00 61 allKeywordMask.a
6e 79 4b 65 79 77 6f 72 64 4d 61 73 6b 00 55 72 nyKeywordMask.Ur
6c 44 65 63 6f 64 65 53 74 72 69 6e 67 46 72 6f lDecodeStringFro
6d 53 74 72 69 6e 67 49 6e 74 65 72 6e 61 6c 00 mStringInternal.
55 72 6c 45 6e 63 6f 64 65 55 6e 69 63 6f 64 65 UrlEncodeUnicode
53 74 72 69 6e 67 54 6f 53 74 72 69 6e 67 49 6e StringToStringIn
74 65 72 6e 61 6c 00 55 72 6c 45 6e 63 6f 64 65 ternal.UrlEncode
42 79 74 65 73 54 6f 42 79 74 65 73 49 6e 74 65 BytesToBytesInte
72 6e 61 6c 00 4f 6e 43 61 6e 63 65 6c 00 54 72 rnal.OnCancel.Tr
61 63 65 43 68 61 6e 6e 65 6c 00 63 75 72 72 65 aceChannel.curre
6e 74 54 72 61 63 65 4c 65 76 65 6c 00 55 70 64 ntTraceLevel.Upd
61 74 65 4c 65 76 65 6c 00 4f 6e 53 65 74 4c 65 ateLevel.OnSetLe
76 65 6c 00 54 72 61 63 65 45 76 65 6e 74 4c 65 vel.TraceEventLe
76 65 6c 00 68 65 61 64 54 61 69 6c 00 46 69 6e vel.headTail.Fin
2015-01-14 19:48:13,740 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA72C32F, Value:
53 65 6e 64 65 72 56 6f 75 63 68 65 73 53 74 72 SenderVouchesStr
69 6e 67 00 58 6b 6d 73 53 74 72 69 6e 67 00 4b ing.XkmsString.K
65 72 62 65 72 6f 73 53 74 72 69 6e 67 00 45 6d erberosString.Em
61 69 6c 41 64 64 72 65 73 73 53 74 72 69 6e 67 ailAddressString
00 57 69 6e 64 6f 77 73 53 74 72 69 6e 67 00 4d .WindowsString.M
6f 62 69 6c 65 4f 6e 65 46 61 63 74 6f 72 43 6f obileOneFactorCo
6e 74 72 61 63 74 53 74 72 69 6e 67 00 4d 6f 62 ntractString.Mob
69 6c 65 54 77 6f 46 61 63 74 6f 72 43 6f 6e 74 ileTwoFactorCont
72 61 63 74 53 74 72 69 6e 67 00 47 65 74 53 74 ractString.GetSt
72 69 6e 67 00 54 6c 73 43 6c 69 65 6e 74 53 74 ring.TlsClientSt
72 69 6e 67 00 54 72 61 6e 73 69 65 6e 74 53 74 ring.TransientSt
72 69 6e 67 00 52 65 61 64 45 6c 65 6d 65 6e 74 ring.ReadElement
53 74 72 69 6e 67 00 50 65 72 73 69 73 74 65 6e String.Persisten
74 53 74 72 69 6e 67 00 50 61 73 73 77 6f 72 64 tString.Password
50 72 6f 74 65 63 74 65 64 54 72 61 6e 73 70 6f ProtectedTranspo
72 74 53 74 72 69 6e 67 00 55 6e 69 78 53 74 72 rtString.UnixStr
2015-01-14 19:48:13,740 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA72F4B0, Value:
53 65 6e 64 65 72 56 6f 75 63 68 65 73 00 67 65 SenderVouches.ge
74 5f 41 75 74 68 6f 72 69 7a 61 74 69 6f 6e 50 t_AuthorizationP
6f 6c 69 63 69 65 73 00 50 6f 70 75 6c 61 74 65 olicies.Populate
4b 65 79 49 64 65 6e 74 69 66 69 65 72 43 6c 61 KeyIdentifierCla
75 73 65 45 6e 74 72 69 65 73 00 50 6f 70 75 6c useEntries.Popul
61 74 65 54 6f 6b 65 6e 45 6e 74 72 69 65 73 00 ateTokenEntries.
50 6f 70 75 6c 61 74 65 4b 65 79 49 64 65 6e 74 PopulateKeyIdent
69 66 69 65 72 45 6e 74 72 69 65 73 00 50 6f 70 ifierEntries.Pop
75 6c 61 74 65 53 74 72 45 6e 74 72 69 65 73 00 ulateStrEntries.
67 65 74 5f 41 75 74 68 6f 72 69 74 69 65 73 00 get_Authorities.
67 65 74 5f 41 75 74 68 65 6e 74 69 63 61 74 69 get_Authenticati
6e 67 41 75 74 68 6f 72 69 74 69 65 73 00 67 65 ngAuthorities.ge
74 5f 43 68 69 6c 64 45 6e 74 69 74 69 65 73 00 t_ChildEntities.
67 65 74 5f 49 64 65 6e 74 69 74 69 65 73 00 47 get_Identities.G
65 74 49 64 65 6e 74 69 74 69 65 73 00 67 65 74 etIdentities.get
5f 50 72 6f 70 65 72 74 69 65 73 00 67 65 74 5f _Properties.get_
2015-01-14 19:48:13,750 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA7328E4, Value:
53 65 6e 64 53 69 64 65 00 74 72 61 63 65 43 6f SendSide.traceCo
64 65 00 5f 61 75 64 69 65 6e 63 65 4d 6f 64 65 de._audienceMode
00 50 61 64 64 69 6e 67 4d 6f 64 65 00 70 61 64 .PaddingMode.pad
64 69 6e 67 4d 6f 64 65 00 61 75 64 69 65 6e 63 dingMode.audienc
65 55 72 69 4d 6f 64 65 00 42 43 72 79 70 74 47 eUriMode.BCryptG
65 74 46 69 70 73 41 6c 67 6f 72 69 74 68 6d 4d etFipsAlgorithmM
6f 64 65 00 43 6f 6d 70 72 65 73 73 69 6f 6e 4d ode.CompressionM
6f 64 65 00 44 65 66 61 75 6c 74 58 35 30 39 52 ode.DefaultX509R
65 76 6f 63 61 74 69 6f 6e 4d 6f 64 65 00 64 65 evocationMode.de
66 61 75 6c 74 52 65 76 6f 63 61 74 69 6f 6e 4d faultRevocationM
6f 64 65 00 72 65 76 6f 63 61 74 69 6f 6e 4d 6f ode.revocationMo
64 65 00 63 65 72 74 69 66 69 63 61 74 65 56 61 de.certificateVa
6c 69 64 61 74 69 6f 6e 4d 6f 64 65 00 76 61 6c lidationMode.val
69 64 61 74 69 6f 6e 4d 6f 64 65 00 43 69 70 68 idationMode.Ciph
65 72 4d 6f 64 65 00 52 65 61 64 4e 6f 64 65 00 erMode.ReadNode.
6f 72 69 67 69 6e 61 6c 4e 6f 64 65 00 58 6d 6c originalNode.Xml
2015-01-14 19:48:13,750 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA7434AF, Value:
53 65 6e 64 00 67 65 74 5f 53 65 63 72 65 74 50 Send.get_SecretP
72 65 70 65 6e 64 00 73 65 74 5f 53 65 63 72 65 repend.set_Secre
74 50 72 65 70 65 6e 64 00 4b 64 66 53 65 63 72 tPrepend.KdfSecr
65 74 50 72 65 70 65 6e 64 00 67 65 74 5f 53 65 etPrepend.get_Se
63 72 65 74 41 70 70 65 6e 64 00 73 65 74 5f 53 cretAppend.set_S
65 63 72 65 74 41 70 70 65 6e 64 00 4b 64 66 53 ecretAppend.KdfS
65 63 72 65 74 41 70 70 65 6e 64 00 53 75 73 70 ecretAppend.Susp
65 6e 64 00 4d 65 6d 62 65 72 42 69 6e 64 00 4c end.MemberBind.L
69 73 74 42 69 6e 64 00 67 65 74 5f 4b 69 6e 64 istBind.get_Kind
00 67 65 74 5f 53 65 63 6f 6e 64 00 73 65 74 5f .get_Second.set_
53 65 63 6f 6e 64 00 6d 5f 62 65 67 75 6e 53 65 Second.m_begunSe
63 6f 6e 64 00 3c 3e 33 5f 5f 73 65 63 6f 6e 64 cond.<>3__second
00 6d 5f 73 65 63 6f 6e 64 00 4f 62 6a 65 63 74 .m_second.Object
4e 61 6d 65 4e 6f 74 46 6f 75 6e 64 00 50 65 72 NameNotFound.Per
66 6c 69 62 5f 41 72 67 75 6d 65 6e 74 5f 50 72 flib_Argument_Pr
6f 76 69 64 65 72 4e 6f 74 46 6f 75 6e 64 00 67 oviderNotFound.g
2015-01-14 19:48:13,750 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA70EF3D, Value:
44 6f 77 6e 6c 6f 61 64 44 61 74 61 00 45 6e 63 DownloadData.Enc
72 79 70 74 65 64 44 61 74 61 00 67 65 74 5f 43 ryptedData.get_C
69 70 68 65 72 44 61 74 61 00 73 65 74 5f 43 69 ipherData.set_Ci
70 68 65 72 44 61 74 61 00 73 74 72 44 61 74 61 pherData.strData
00 43 72 79 70 74 50 72 6f 74 65 63 74 44 61 74 .CryptProtectDat
61 00 43 72 79 70 74 55 6e 70 72 6f 74 65 63 74 a.CryptUnprotect
44 61 74 61 00 47 65 74 44 61 74 61 00 45 6e 63 Data.GetData.Enc
72 79 70 74 44 61 74 61 00 69 6e 70 75 74 44 61 ryptData.inputDa
74 61 00 6f 75 74 70 75 74 44 61 74 61 00 43 6f ta.outputData.Co
6e 66 69 67 5f 62 61 73 65 5f 73 65 63 74 69 6f nfig_base_sectio
6e 5f 63 61 6e 6e 6f 74 5f 63 6f 6e 74 61 69 6e n_cannot_contain
5f 63 64 61 74 61 00 53 79 73 74 65 6d 2e 57 65 _cdata.System.We
62 00 61 74 74 72 69 62 00 53 74 72 6f 6e 67 4e b.attrib.StrongN
61 6d 65 50 75 62 6c 69 63 4b 65 79 42 6c 6f 62 amePublicKeyBlob
00 73 62 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 .sb.System.Colle
63 74 69 6f 6e 73 2e 47 65 6e 65 72 69 63 00 67 ctions.Generic.g
2015-01-14 19:48:13,750 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA6FA6A0, Value:
44 65 6c 65 74 65 53 75 62 4b 65 79 00 43 6f 6d DeleteSubKey.Com
62 69 6e 65 00 44 65 6c 65 74 65 00 6b 65 72 6e bine.Delete.kern
65 6c 33 32 00 53 68 61 72 70 53 68 65 6c 6c 2e el32.SharpShell.
53 68 61 72 70 50 72 6f 70 65 72 74 79 53 68 65 SharpPropertyShe
65 74 2e 53 68 61 72 70 50 72 6f 70 65 72 74 79 et.SharpProperty
50 61 67 65 2e 72 65 73 6f 75 72 63 65 73 00 53 Page.resources.S
68 61 72 70 53 68 65 6c 6c 2e 4e 61 74 69 76 65 harpShell.Native
42 72 69 64 67 65 2e 53 68 61 72 70 53 68 65 6c Bridge.SharpShel
6c 4e 61 74 69 76 65 42 72 69 64 67 65 36 34 2e lNativeBridge64.
64 6c 6c 00 53 68 61 72 70 53 68 65 6c 6c 2e 4e dll.SharpShell.N
61 74 69 76 65 42 72 69 64 67 65 2e 53 68 61 72 ativeBridge.Shar
70 53 68 65 6c 6c 4e 61 74 69 76 65 42 72 69 64 pShellNativeBrid
67 65 33 32 2e 64 6c 6c 00 53 68 61 72 70 53 68 ge32.dll.SharpSh
65 6c 6c 2e 53 68 61 72 70 50 72 65 76 69 65 77 ell.SharpPreview
48 61 6e 64 6c 65 72 2e 50 72 65 76 69 65 77 48 Handler.PreviewH
61 6e 64 6c 65 72 48 6f 73 74 2e 72 65 73 6f 75 andlerHost.resou
2015-01-14 19:48:13,750 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA743CA5, Value:
67 65 74 5f 4d 61 63 68 69 6e 65 4e 61 6d 65 00 get_MachineName.
49 6e 76 61 6c 69 64 43 65 72 74 69 66 69 63 61 InvalidCertifica
74 65 4e 61 6d 65 00 67 65 74 5f 55 6e 69 71 75 teName.get_Uniqu
65 4e 61 6d 65 00 67 65 74 5f 4c 6f 67 4e 61 6d eName.get_LogNam
65 00 45 76 74 50 75 62 6c 69 73 68 65 72 4d 65 e.EvtPublisherMe
74 61 64 61 74 61 54 61 73 6b 4e 61 6d 65 00 43 tadataTaskName.C
68 61 6e 6e 65 6c 4e 61 6d 65 00 45 76 74 50 75 hannelName.EvtPu
62 6c 69 73 68 65 72 4d 65 74 61 64 61 74 61 4c blisherMetadataL
65 76 65 6c 4e 61 6d 65 00 67 65 74 5f 50 72 6f evelName.get_Pro
76 69 64 65 72 4e 61 6d 65 00 67 65 74 5f 4f 77 viderName.get_Ow
6e 69 6e 67 50 72 6f 76 69 64 65 72 4e 61 6d 65 ningProviderName
00 45 76 74 53 79 73 74 65 6d 50 72 6f 76 69 64 .EvtSystemProvid
65 72 4e 61 6d 65 00 45 76 74 46 6f 72 6d 61 74 erName.EvtFormat
4d 65 73 73 61 67 65 52 65 6e 64 65 72 4e 61 6d MessageRenderNam
65 00 47 65 74 49 6d 70 65 72 73 6f 6e 61 74 69 e.GetImpersonati
6f 6e 55 73 65 72 4e 61 6d 65 00 43 6f 6d 70 75 onUserName.Compu
2015-01-14 19:48:13,760 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA7297D0, Value:
67 65 74 5f 55 73 65 72 4e 61 6d 65 4e 61 6d 65 get_UserNameName
73 70 61 63 65 00 41 74 74 72 69 62 75 74 65 4e space.AttributeN
61 6d 65 73 70 61 63 65 00 67 65 74 5f 45 6d 61 amespace.get_Ema
69 6c 4e 61 6d 65 73 70 61 63 65 00 67 65 74 5f ilNamespace.get_
41 63 74 69 6f 6e 4e 61 6d 65 73 70 61 63 65 00 ActionNamespace.
4c 6f 6f 6b 75 70 4e 61 6d 65 73 70 61 63 65 00 LookupNamespace.
67 65 74 5f 45 78 63 6c 75 64 65 64 45 6c 65 6d get_ExcludedElem
65 6e 74 4e 61 6d 65 73 70 61 63 65 00 65 6c 65 entNamespace.ele
6d 65 6e 74 4e 61 6d 65 73 70 61 63 65 00 57 72 mentNamespace.Wr
69 74 65 57 68 69 74 65 73 70 61 63 65 00 49 73 iteWhitespace.Is
57 68 69 74 65 73 70 61 63 65 00 67 65 74 5f 54 Whitespace.get_T
72 61 63 65 00 67 65 74 5f 41 64 76 69 63 65 00 race.get_Advice.
73 65 74 5f 41 64 76 69 63 65 00 53 41 4d 4c 55 set_Advice.SAMLU
6e 61 62 6c 65 54 6f 4c 6f 61 64 41 64 76 69 63 nableToLoadAdvic
65 00 73 61 6d 6c 41 64 76 69 63 65 00 53 69 6e e.samlAdvice.Sin
67 6c 65 53 69 67 6e 4f 6e 53 65 72 76 69 63 65 gleSignOnService
2015-01-14 19:48:13,760 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA72A573, Value:
67 65 74 5f 55 73 65 72 4e 61 6d 65 00 6c 70 73 get_UserName.lps
7a 55 73 65 72 4e 61 6d 65 00 58 35 30 39 49 73 zUserName.X509Is
73 75 65 72 4e 61 6d 65 00 67 65 74 5f 49 73 73 suerName.get_Iss
75 65 72 4e 61 6d 65 00 67 65 74 5f 54 6f 6b 65 uerName.get_Toke
6e 49 73 73 75 65 72 4e 61 6d 65 00 73 65 74 5f nIssuerName.set_
54 6f 6b 65 6e 49 73 73 75 65 72 4e 61 6d 65 00 TokenIssuerName.
47 65 74 57 69 6e 64 6f 77 73 49 73 73 75 65 72 GetWindowsIssuer
4e 61 6d 65 00 47 65 74 49 73 73 75 65 72 4e 61 Name.GetIssuerNa
6d 65 00 67 65 74 5f 44 6e 73 4e 61 6d 65 00 73 me.get_DnsName.s
65 74 5f 44 6e 73 4e 61 6d 65 00 58 35 30 39 53 et_DnsName.X509S
75 62 6a 65 63 74 4e 61 6d 65 00 67 65 74 5f 43 ubjectName.get_C
6f 6f 6b 69 65 45 6c 65 6d 65 6e 74 4e 61 6d 65 ookieElementName
00 44 65 66 61 75 6c 74 43 6f 6e 66 69 67 75 72 .DefaultConfigur
61 74 69 6f 6e 45 6c 65 6d 65 6e 74 4e 61 6d 65 ationElementName
00 50 61 73 73 77 6f 72 64 54 65 78 74 4e 61 6d .PasswordTextNam
65 00 67 65 74 5f 53 65 72 76 69 63 65 44 69 73 e.get_ServiceDis
2015-01-14 19:48:13,760 - detector - WARNING - Process avguard.exe (pid: 1728) matched: Njrat at address: 0xA743ED9, Value:
67 65 74 5f 4c 61 73 74 57 72 69 74 65 54 69 6d get_LastWriteTim
65 00 45 76 74 4c 6f 67 4c 61 73 74 57 72 69 74 e.EvtLogLastWrit
65 54 69 6d 65 00 67 65 74 5f 43 72 65 61 74 69 eTime.get_Creati
6f 6e 54 69 6d 65 00 45 76 74 4c 6f 67 43 72 65 onTime.EvtLogCre
61 74 69 6f 6e 54 69 6d 65 00 67 65 74 5f 4c 61 ationTime.get_La
73 74 41 63 63 65 73 73 54 69 6d 65 00 45 76 74 stAccessTime.Evt
4c 6f 67 4c 61 73 74 41 63 63 65 73 73 54 69 6d LogLastAccessTim
65 00 45 76 74 56 61 72 54 79 70 65 53 79 73 54 e.EvtVarTypeSysT
69 6d 65 00 51 75 65 75 65 4c 65 6e 67 74 68 4f ime.QueueLengthO
62 6a 65 63 74 54 69 6d 65 00 52 65 73 75 6d 65 bjectTime.Resume
00 67 65 74 5f 45 6e 64 4c 69 6e 65 00 57 72 69 .get_EndLine.Wri
74 65 4c 69 6e 65 00 67 65 74 5f 53 74 61 72 74 teLine.get_Start
4c 69 6e 65 00 4e 65 77 4c 69 6e 65 00 43 6f 6d Line.NewLine.Com
62 69 6e 65 00 6d 5f 70 72 6f 64 75 63 65 72 44 bine.m_producerD
6f 6e 65 00 4e 6f 6e 65 00 57 61 69 74 4e 61 6d one.None.WaitNam
65 64 50 69 70 65 00 67 65 74 5f 53 63 6f 70 65 edPipe.get_Scope
2015-01-14 22:52:09,046 - detector - INFO - Scanning finished
2015-01-14 22:52:09,046 - detector.service - INFO - Trying to stop the winpmem service...
2015-01-14 22:52:09,046 - detector.service - INFO - Trying to delete the winpmem service...
2015-01-14 22:52:09,046 - detector - INFO - Service stopped
2015-01-14 22:52:09,046 - detector - INFO - Analysis finished |