Analysis Report Package_details.exe

Overview

General Information

Sample Name: Package_details.exe
Analysis ID: 321402
MD5: ce3c5367fb067a45f5fa10c35ca23a28
SHA1: 9d0f4d746747a6fd13a48b1a867eb8d103d9daec
SHA256: e4fc20492ed4f4750766382f6578d84f38bf680646eb6b5193c5733925941f67
Tags: NanoCore

Most interesting Screenshot:

Detection

Nanocore
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected Nanocore Rat
Detected unpacking (creates a PE file in dynamic memory)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection:

barindex
Multi AV Scanner detection for dropped file
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Virustotal: Detection: 34% Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe ReversingLabs: Detection: 25%
Multi AV Scanner detection for submitted file
Source: Package_details.exe ReversingLabs: Detection: 25%
Yara detected Nanocore RAT
Source: Yara match File source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\AppData\sysfonts.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Joe Sandbox ML: detected
Machine Learning detection for sample
Source: Package_details.exe Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 0.2.Package_details.exe.3160000.4.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 13.2.dhcpmon.exe.2420000.2.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 9.2.Package_details.exe.25c0000.4.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 21.2.dhcpmon.exe.5470000.3.unpack Avira: Label: TR/Dropper.MSIL.Gen7
Source: 0.2.Package_details.exe.1910000.3.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 14.2.Package_details.exe.2fb0000.4.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 10.2.dhcpmon.exe.df0000.2.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 14.2.Package_details.exe.2db0000.3.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 19.2.Package_details.exe.400000.0.unpack Avira: Label: TR/Dropper.MSIL.Gen7
Source: 18.2.dhcpmon.exe.2a40000.4.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 13.2.dhcpmon.exe.2600000.4.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 12.2.dhcpmon.exe.400000.1.unpack Avira: Label: TR/Dropper.MSIL.Gen7
Source: 12.2.dhcpmon.exe.57b0000.3.unpack Avira: Label: TR/Dropper.MSIL.Gen7
Source: 9.2.Package_details.exe.d10000.1.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 10.2.dhcpmon.exe.2ae0000.4.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 21.2.dhcpmon.exe.400000.1.unpack Avira: Label: TR/Dropper.MSIL.Gen7
Source: 18.2.dhcpmon.exe.1040000.3.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 19.2.Package_details.exe.2ad0000.3.unpack Avira: Label: TR/Dropper.MSIL.Gen7
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00404A29 FindFirstFileExW, 12_2_00404A29
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_00404A29 FindFirstFileExW, 19_2_00404A29
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_00404A29 FindFirstFileExW, 21_2_00404A29

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 209.159.151.5:24980
Connects to many ports of the same IP (likely port scanning)
Source: global traffic TCP traffic: 209.159.151.5 ports 0,2,4,24980,8,9
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.3:49706 -> 209.159.151.5:24980
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: IS-AS-1US IS-AS-1US
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: unknown TCP traffic detected without corresponding DNS query: 209.159.151.5
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp String found in binary or memory: http://google.com

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: dhcpmon.exe, 0000000A.00000002.242645908.0000000000EAA000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Installs a raw input device (often for capturing keystrokes)
Source: dhcpmon.exe, 0000000C.00000002.255256887.000000000365E000.00000004.00000001.sdmp Binary or memory string: RegisterRawInputDevices

E-Banking Fraud:

barindex
Yara detected Nanocore RAT
Source: Yara match File source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000C.00000002.255256887.000000000365E000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.273427338.0000000002ECE000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.279433728.00000000032DE000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Package_details.exe PID: 4156, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE Matched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Detected potential crypto function
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA60B8 0_2_00DA60B8
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D9F8B5 0_2_00D9F8B5
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D9A800 0_2_00D9A800
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA6828 0_2_00DA6828
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DAB16E 0_2_00DAB16E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DADCF9 0_2_00DADCF9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA6456 0_2_00DA6456
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DABC10 0_2_00DABC10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA6C10 0_2_00DA6C10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA5C23 0_2_00DA5C23
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DAB6BF 0_2_00DAB6BF
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DACFC1 0_2_00DACFC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA60B8 9_2_00DA60B8
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00D9F8B5 9_2_00D9F8B5
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00D9A800 9_2_00D9A800
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA6828 9_2_00DA6828
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DAB16E 9_2_00DAB16E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DADCF9 9_2_00DADCF9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA6456 9_2_00DA6456
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DABC10 9_2_00DABC10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA6C10 9_2_00DA6C10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA5C23 9_2_00DA5C23
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DAB6BF 9_2_00DAB6BF
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DACFC1 9_2_00DACFC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00316828 10_2_00316828
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0030A800 10_2_0030A800
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0030F8B5 10_2_0030F8B5
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_003160B8 10_2_003160B8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0031B16E 10_2_0031B16E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00315C23 10_2_00315C23
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0031BC10 10_2_0031BC10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00316C10 10_2_00316C10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00316456 10_2_00316456
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0031DCF9 10_2_0031DCF9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0031B6BF 10_2_0031B6BF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0031CFC1 10_2_0031CFC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA60B8 11_2_00DA60B8
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00D9F8B5 11_2_00D9F8B5
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00D9A800 11_2_00D9A800
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA6828 11_2_00DA6828
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DAB16E 11_2_00DAB16E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DADCF9 11_2_00DADCF9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA6456 11_2_00DA6456
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DABC10 11_2_00DABC10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA6C10 11_2_00DA6C10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA5C23 11_2_00DA5C23
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DAB6BF 11_2_00DAB6BF
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DACFC1 11_2_00DACFC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00316828 12_2_00316828
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0030A800 12_2_0030A800
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0030F8B5 12_2_0030F8B5
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_003160B8 12_2_003160B8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0031B16E 12_2_0031B16E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00315C23 12_2_00315C23
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0031BC10 12_2_0031BC10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00316C10 12_2_00316C10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00316456 12_2_00316456
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0031DCF9 12_2_0031DCF9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0031B6BF 12_2_0031B6BF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0031CFC1 12_2_0031CFC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0040A2A5 12_2_0040A2A5
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_03152EE2 12_2_03152EE2
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_058223A0 12_2_058223A0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_05822FA8 12_2_05822FA8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_05823850 12_2_05823850
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0582306F 12_2_0582306F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00316828 13_2_00316828
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0030A800 13_2_0030A800
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0030F8B5 13_2_0030F8B5
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_003160B8 13_2_003160B8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00325968 13_2_00325968
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0031B16E 13_2_0031B16E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00315C23 13_2_00315C23
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0031BC10 13_2_0031BC10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00316C10 13_2_00316C10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00316456 13_2_00316456
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0031DCF9 13_2_0031DCF9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0031B6BF 13_2_0031B6BF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0031CFC1 13_2_0031CFC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA60B8 14_2_00DA60B8
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00D9F8B5 14_2_00D9F8B5
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00D9A800 14_2_00D9A800
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA6828 14_2_00DA6828
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DAB16E 14_2_00DAB16E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DADCF9 14_2_00DADCF9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA6456 14_2_00DA6456
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DABC10 14_2_00DABC10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA6C10 14_2_00DA6C10
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA5C23 14_2_00DA5C23
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DAB6BF 14_2_00DAB6BF
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DACFC1 14_2_00DACFC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00316828 18_2_00316828
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0030A800 18_2_0030A800
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0030F8B5 18_2_0030F8B5
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_003160B8 18_2_003160B8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0031B16E 18_2_0031B16E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00315C23 18_2_00315C23
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0031BC10 18_2_0031BC10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00316C10 18_2_00316C10
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00316456 18_2_00316456
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0031DCF9 18_2_0031DCF9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0031B6BF 18_2_0031B6BF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0031CFC1 18_2_0031CFC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_0040A2A5 19_2_0040A2A5
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_02B423A0 19_2_02B423A0
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_02B42FA8 19_2_02B42FA8
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_02B43850 19_2_02B43850
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_02B4306F 19_2_02B4306F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_0040A2A5 21_2_0040A2A5
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_02F02DC7 21_2_02F02DC7
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_02F623A0 21_2_02F623A0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_02F62FA8 21_2_02F62FA8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_02F63850 21_2_02F63850
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_02F6306F 21_2_02F6306F
Found potential string decryption / allocating functions
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00D972E0 appears 78 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00DA0C72 appears 56 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00D9BED0 appears 44 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00DA10D9 appears 80 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00D9C147 appears 44 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00D9C660 appears 36 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00DA1840 appears 152 times
Source: C:\Users\user\Desktop\Package_details.exe Code function: String function: 00D995BA appears 60 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 0030C147 appears 44 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 0030C660 appears 36 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 003110D9 appears 80 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 003095BA appears 59 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 00311840 appears 156 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 003072E0 appears 78 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 00310C72 appears 56 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 00401ED0 appears 44 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 0040569E appears 36 times
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: String function: 0030BED0 appears 44 times
PE file contains strange resources
Source: Package_details.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Package_details.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Package_details.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: sysfonts.exe.0.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: sysfonts.exe.0.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: sysfonts.exe.0.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.2.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.2.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.2.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: Package_details.exe, 00000000.00000003.212701368.0000000003476000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameNanoCoreBase.dll< vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameFileBrowserClient.dllT vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameNAudio.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000009.00000003.236429993.0000000002A6F000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs Package_details.exe
Source: Package_details.exe, 0000000E.00000003.253204804.0000000003146000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs Package_details.exe
Source: Package_details.exe, 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameLzma#.dll4 vs Package_details.exe
Source: Package_details.exe, 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Package_details.exe
Source: Package_details.exe, 00000013.00000002.273769173.00000000050F0000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameuser32j% vs Package_details.exe
Yara signature match
Source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000C.00000002.255256887.000000000365E000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.273427338.0000000002ECE000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.279433728.00000000032DE000.00000004.00000001.sdmp, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Package_details.exe PID: 4156, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.cs Cryptographic APIs: 'CreateDecryptor'
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.cs Cryptographic APIs: 'CreateDecryptor'
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.cs Cryptographic APIs: 'CreateDecryptor'
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: classification engine Classification label: mal100.troj.evad.winEXE@31/13@0/1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess, 12_2_00401489
Source: C:\Users\user\Desktop\Package_details.exe File created: C:\Program Files (x86)\DHCP Monitor Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe File created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1560:120:WilError_01
Source: C:\Users\user\Desktop\Package_details.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Users\user\Desktop\Package_details.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\{8127ccf6-0246-44cc-81bf-cfc57c0704b0}
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5548:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2296:120:WilError_01
Source: C:\Users\user\Desktop\Package_details.exe File created: C:\Users\user\AppData\Local\Temp\AppData Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: User 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 32.d 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: Rpcr 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: t4.d 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: cls 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 5.Exit 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 3.Show 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 1.Install 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: User 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 32.d 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: Rpcr 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: t4.d 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: cls 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 5.Exit 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 3.Show 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 1.Install 9_2_00D91FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: User 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 32.d 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: Rpcr 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: t4.d 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: cls 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 5.Exit 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 3.Show 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 1.Install 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: User 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 32.d 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: Rpcr 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: t4.d 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: cls 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 5.Exit 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 3.Show 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 1.Install 13_2_00301FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: User 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 32.d 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: Rpcr 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: t4.d 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: cls 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 5.Exit 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 3.Show 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Command line argument: 1.Install 14_2_00D91FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: User 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 32.d 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: Rpcr 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: t4.d 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: cls 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 5.Exit 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 3.Show 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Command line argument: 1.Install 18_2_00301FA0
Source: Package_details.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Package_details.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Package_details.exe ReversingLabs: Detection: 25%
Source: Package_details.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: Package_details.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: Package_details.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: Package_details.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: dhcpmon.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: dhcpmon.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: dhcpmon.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: dhcpmon.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: Package_details.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: Package_details.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: dhcpmon.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: dhcpmon.exe String found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
Source: C:\Users\user\Desktop\Package_details.exe File read: C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Package_details.exe 'C:\Users\user\Desktop\Package_details.exe'
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /Create /TN fonts /XML 'C:\Users\user\AppData\Local\Temp\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml'
Source: unknown Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe
Source: unknown Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN fonts /XML 'C:\Users\user\AppData\Local\Temp\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml'
Source: unknown Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp30A7.tmp'
Source: unknown Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp33C5.tmp'
Source: unknown Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe 0
Source: unknown Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
Source: unknown Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe
Source: unknown Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: unknown Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
Source: unknown Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe
Source: unknown Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: unknown Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: unknown Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe
Source: unknown Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /Create /TN fonts /XML 'C:\Users\user\AppData\Local\Temp\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN fonts /XML 'C:\Users\user\AppData\Local\Temp\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp30A7.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp33C5.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe File opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll Jump to behavior
Source: Package_details.exe Static PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wntdll.pdbUGP source: Package_details.exe, 00000000.00000003.211610804.0000000003360000.00000004.00000001.sdmp, Package_details.exe, 00000009.00000003.236110385.0000000002950000.00000004.00000001.sdmp, dhcpmon.exe, 0000000A.00000003.240365481.0000000002CE0000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000003.247549531.0000000002800000.00000004.00000001.sdmp, Package_details.exe, 0000000E.00000003.249944168.00000000031C0000.00000004.00000001.sdmp, dhcpmon.exe, 00000012.00000003.262905644.0000000002C40000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: Package_details.exe, 00000000.00000003.211610804.0000000003360000.00000004.00000001.sdmp, Package_details.exe, 00000009.00000003.236110385.0000000002950000.00000004.00000001.sdmp, dhcpmon.exe, 0000000A.00000003.240365481.0000000002CE0000.00000004.00000001.sdmp, dhcpmon.exe, 0000000D.00000003.247549531.0000000002800000.00000004.00000001.sdmp, Package_details.exe, 0000000E.00000003.249944168.00000000031C0000.00000004.00000001.sdmp, dhcpmon.exe, 00000012.00000003.262905644.0000000002C40000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp

Data Obfuscation:

barindex
Detected unpacking (creates a PE file in dynamic memory)
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Unpacked PE file: 21.2.dhcpmon.exe.5470000.3.unpack
.NET source code contains potential unpacker
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs .Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs .Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs .Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs .Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs .Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs .Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA9B4F LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_00DA9B4F
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA1885 push ecx; ret 0_2_00DA1898
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DB64B9 push eax; ret 0_2_00DB64E9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DB6538 push eax; ret 0_2_00DB64E9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D9BF6F push ecx; ret 0_2_00D9BF82
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA1885 push ecx; ret 9_2_00DA1898
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DB64B9 push eax; ret 9_2_00DB64E9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DB6538 push eax; ret 9_2_00DB64E9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00D9BF6F push ecx; ret 9_2_00D9BF82
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00311885 push ecx; ret 10_2_00311898
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_003264B9 push eax; ret 10_2_003264E9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00326538 push eax; ret 10_2_003264E9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0030BF6F push ecx; ret 10_2_0030BF82
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA1885 push ecx; ret 11_2_00DA1898
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00D9BF6F push ecx; ret 11_2_00D9BF82
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00311885 push ecx; ret 12_2_00311898
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0030BF6F push ecx; ret 12_2_0030BF82
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00401F16 push ecx; ret 12_2_00401F29
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00311885 push ecx; ret 13_2_00311898
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_003264B9 push eax; ret 13_2_003264E9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00326538 push eax; ret 13_2_003264E9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0030BF6F push ecx; ret 13_2_0030BF82
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA1885 push ecx; ret 14_2_00DA1898
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DB64B9 push eax; ret 14_2_00DB64E9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DB6538 push eax; ret 14_2_00DB64E9
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00D9BF6F push ecx; ret 14_2_00D9BF82
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00311885 push ecx; ret 18_2_00311898
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_003264B9 push eax; ret 18_2_003264E9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00326538 push eax; ret 18_2_003264E9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0030BF6F push ecx; ret 18_2_0030BF82
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_00401F16 push ecx; ret 19_2_00401F29
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_00401F16 push ecx; ret 21_2_00401F29
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.cs High entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 12.2.dhcpmon.exe.57b0000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.cs High entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.cs High entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 19.2.Package_details.exe.2ad0000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.cs High entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.cs High entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 21.2.dhcpmon.exe.5470000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.cs High entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\Package_details.exe File created: C:\Users\user\AppData\Local\Temp\AppData\sysfonts.exe Jump to dropped file
Source: C:\Users\user\Desktop\Package_details.exe File created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedules
Source: unknown Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN fonts /XML 'C:\Users\user\AppData\Local\Temp\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml'

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Users\user\Desktop\Package_details.exe File opened: C:\Users\user\Desktop\Package_details.exe:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\Package_details.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\Package_details.exe Window / User API: threadDelayed 355 Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Window / User API: threadDelayed 1143 Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Window / User API: foregroundWindowGot 649 Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Window / User API: foregroundWindowGot 654 Jump to behavior
Found dropped PE file which has not been started or loaded
Source: C:\Users\user\Desktop\Package_details.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AppData\sysfonts.exe Jump to dropped file
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\Package_details.exe TID: 2024 Thread sleep time: -1844674407370954s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe TID: 160 Thread sleep time: -120000s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4456 Thread sleep count: 43 > 30 Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4944 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe TID: 6376 Thread sleep count: 41 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe TID: 6372 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6584 Thread sleep count: 38 > 30 Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6568 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00404A29 FindFirstFileExW, 12_2_00404A29
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_00404A29 FindFirstFileExW, 19_2_00404A29
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_00404A29 FindFirstFileExW, 21_2_00404A29
Source: Package_details.exe, 00000002.00000003.222172752.0000000001653000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: Package_details.exe, 00000002.00000003.224689217.0000000001653000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Package_details.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D9F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00D9F195
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA9B4F LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_00DA9B4F
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D91FA0 mov eax, dword ptr fs:[00000030h] 0_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DB7A4E mov eax, dword ptr fs:[00000030h] 0_2_00DB7A4E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DBB3CD mov eax, dword ptr fs:[00000030h] 0_2_00DBB3CD
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DBB46D mov eax, dword ptr fs:[00000030h] 0_2_00DBB46D
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DBB40A mov eax, dword ptr fs:[00000030h] 0_2_00DBB40A
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00D91FA0 mov eax, dword ptr fs:[00000030h] 9_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DB7A4E mov eax, dword ptr fs:[00000030h] 9_2_00DB7A4E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DBB3CD mov eax, dword ptr fs:[00000030h] 9_2_00DBB3CD
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DBB46D mov eax, dword ptr fs:[00000030h] 9_2_00DBB46D
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DBB40A mov eax, dword ptr fs:[00000030h] 9_2_00DBB40A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00301FA0 mov eax, dword ptr fs:[00000030h] 10_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00327A4E mov eax, dword ptr fs:[00000030h] 10_2_00327A4E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0032B3CD mov eax, dword ptr fs:[00000030h] 10_2_0032B3CD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0032B40A mov eax, dword ptr fs:[00000030h] 10_2_0032B40A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0032B46D mov eax, dword ptr fs:[00000030h] 10_2_0032B46D
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_004035F1 mov eax, dword ptr fs:[00000030h] 12_2_004035F1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00301FA0 mov eax, dword ptr fs:[00000030h] 13_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00327A4E mov eax, dword ptr fs:[00000030h] 13_2_00327A4E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0032B3CD mov eax, dword ptr fs:[00000030h] 13_2_0032B3CD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0032B40A mov eax, dword ptr fs:[00000030h] 13_2_0032B40A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0032B46D mov eax, dword ptr fs:[00000030h] 13_2_0032B46D
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00D91FA0 mov eax, dword ptr fs:[00000030h] 14_2_00D91FA0
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DB7A4E mov eax, dword ptr fs:[00000030h] 14_2_00DB7A4E
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DBB3CD mov eax, dword ptr fs:[00000030h] 14_2_00DBB3CD
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DBB46D mov eax, dword ptr fs:[00000030h] 14_2_00DBB46D
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DBB40A mov eax, dword ptr fs:[00000030h] 14_2_00DBB40A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00301FA0 mov eax, dword ptr fs:[00000030h] 18_2_00301FA0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00327A4E mov eax, dword ptr fs:[00000030h] 18_2_00327A4E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0032B3CD mov eax, dword ptr fs:[00000030h] 18_2_0032B3CD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0032B40A mov eax, dword ptr fs:[00000030h] 18_2_0032B40A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0032B46D mov eax, dword ptr fs:[00000030h] 18_2_0032B46D
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_004035F1 mov eax, dword ptr fs:[00000030h] 19_2_004035F1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_004035F1 mov eax, dword ptr fs:[00000030h] 21_2_004035F1
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_004067FE GetProcessHeap, 12_2_004067FE
Enables debug privileges
Source: C:\Users\user\Desktop\Package_details.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D9F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00D9F195
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA1C7F SetUnhandledExceptionFilter, 0_2_00DA1C7F
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00D9BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00D9BEC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00D9F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 9_2_00D9F195
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00DA1C7F SetUnhandledExceptionFilter, 9_2_00DA1C7F
Source: C:\Users\user\Desktop\Package_details.exe Code function: 9_2_00D9BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 9_2_00D9BEC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0030F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 10_2_0030F195
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_00311C7F SetUnhandledExceptionFilter, 10_2_00311C7F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 10_2_0030BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 10_2_0030BEC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00D9F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 11_2_00D9F195
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00DA1C7F SetUnhandledExceptionFilter, 11_2_00DA1C7F
Source: C:\Users\user\Desktop\Package_details.exe Code function: 11_2_00D9BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_00D9BEC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0030F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_0030F195
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00311C7F SetUnhandledExceptionFilter, 12_2_00311C7F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0030BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 12_2_0030BEC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00401E1D SetUnhandledExceptionFilter, 12_2_00401E1D
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_0040446F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_00401C88
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 12_2_00401F30
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0030F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 13_2_0030F195
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_00311C7F SetUnhandledExceptionFilter, 13_2_00311C7F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 13_2_0030BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 13_2_0030BEC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00D9F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 14_2_00D9F195
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00DA1C7F SetUnhandledExceptionFilter, 14_2_00DA1C7F
Source: C:\Users\user\Desktop\Package_details.exe Code function: 14_2_00D9BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 14_2_00D9BEC1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0030F195 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 18_2_0030F195
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_00311C7F SetUnhandledExceptionFilter, 18_2_00311C7F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 18_2_0030BEC1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 18_2_0030BEC1
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_00401E1D SetUnhandledExceptionFilter, 19_2_00401E1D
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 19_2_0040446F
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 19_2_00401C88
Source: C:\Users\user\Desktop\Package_details.exe Code function: 19_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 19_2_00401F30
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_00401E1D SetUnhandledExceptionFilter, 21_2_00401E1D
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 21_2_0040446F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 21_2_00401C88
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 21_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 21_2_00401F30
Source: C:\Users\user\Desktop\Package_details.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Maps a DLL or memory area into another process
Source: C:\Users\user\Desktop\Package_details.exe Section loaded: unknown target: C:\Users\user\Desktop\Package_details.exe protection: execute and read and write Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Section loaded: unknown target: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Section loaded: unknown target: C:\Users\user\Desktop\Package_details.exe protection: execute and read and write Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Section loaded: unknown target: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe protection: execute and read and write Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN fonts /XML 'C:\Users\user\AppData\Local\Temp\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp30A7.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp33C5.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: C:\Users\user\Desktop\Package_details.exe Process created: C:\Users\user\Desktop\Package_details.exe C:\Users\user\Desktop\Package_details.exe Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Process created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Jump to behavior
Source: Package_details.exe, 00000002.00000003.301899364.000000000161F000.00000004.00000001.sdmp Binary or memory string: Program Manager

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: 12_2_0040208D cpuid 12_2_0040208D
Contains functionality to query locales information (e.g. system language)
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 0_2_00DA50D8
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 0_2_00DA58CF
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoA, 0_2_00D9F04E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 0_2_00DA59F6
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 0_2_00DA418E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 0_2_00DA598F
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 0_2_00DA5A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 0_2_00DA9A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 0_2_00DA9B0C
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 0_2_00DA148E
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 0_2_00DA55FC
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 0_2_00DA4DEA
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 0_2_00DA5507
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 0_2_00DA56FE
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 0_2_00DA56A3
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 0_2_00D9AFFD
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 9_2_00DA50D8
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 9_2_00DA58CF
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoA, 9_2_00D9F04E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 9_2_00DA59F6
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 9_2_00DA418E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 9_2_00DA598F
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 9_2_00DA5A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 9_2_00DA9A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 9_2_00DA9B0C
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 9_2_00DA148E
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 9_2_00DA55FC
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 9_2_00DA4DEA
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 9_2_00DA5507
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 9_2_00DA56FE
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 9_2_00DA56A3
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 9_2_00D9AFFD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA, 10_2_0030F04E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 10_2_003150D8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 10_2_003158CF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 10_2_0031598F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 10_2_0031418E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 10_2_003159F6
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 10_2_00315A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 10_2_00319A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 10_2_00319B0C
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, 10_2_0031AB56
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 10_2_0031148E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 10_2_00315507
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 10_2_003155FC
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 10_2_00314DEA
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 10_2_003156A3
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 10_2_003156FE
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 10_2_0030AFFD
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 11_2_00DA50D8
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 11_2_00DA58CF
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoA, 11_2_00D9F04E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 11_2_00DA59F6
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 11_2_00DA418E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 11_2_00DA598F
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 11_2_00DA5A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 11_2_00DA9A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 11_2_00DA9B0C
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 11_2_00DA148E
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 11_2_00DA55FC
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 11_2_00DA4DEA
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 11_2_00DA5507
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 11_2_00DA56FE
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 11_2_00DA56A3
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 11_2_00D9AFFD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA, 12_2_0030F04E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 12_2_003150D8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 12_2_003158CF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 12_2_0031598F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 12_2_0031418E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 12_2_003159F6
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 12_2_00315A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 12_2_00319A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 12_2_00319B0C
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, 12_2_0031AB56
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 12_2_0031148E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 12_2_00315507
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 12_2_003155FC
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 12_2_00314DEA
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 12_2_003156A3
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 12_2_003156FE
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 12_2_0030AFFD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA, 13_2_0030F04E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 13_2_003150D8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 13_2_003158CF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 13_2_0031598F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 13_2_0031418E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 13_2_003159F6
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 13_2_00315A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 13_2_00319A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 13_2_00319B0C
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, 13_2_0031AB56
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 13_2_0031148E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 13_2_00315507
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 13_2_003155FC
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 13_2_00314DEA
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 13_2_003156A3
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 13_2_003156FE
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 13_2_0030AFFD
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 14_2_00DA50D8
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 14_2_00DA58CF
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoA, 14_2_00D9F04E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 14_2_00DA59F6
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 14_2_00DA418E
Source: C:\Users\user\Desktop\Package_details.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 14_2_00DA598F
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 14_2_00DA5A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 14_2_00DA9A32
Source: C:\Users\user\Desktop\Package_details.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 14_2_00DA9B0C
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 14_2_00DA148E
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 14_2_00DA55FC
Source: C:\Users\user\Desktop\Package_details.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 14_2_00DA4DEA
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 14_2_00DA5507
Source: C:\Users\user\Desktop\Package_details.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 14_2_00DA56FE
Source: C:\Users\user\Desktop\Package_details.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 14_2_00DA56A3
Source: C:\Users\user\Desktop\Package_details.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 14_2_00D9AFFD
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA, 18_2_0030F04E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free, 18_2_003150D8
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage, 18_2_003158CF
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA, 18_2_0031598F
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo, 18_2_0031418E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _strlen,_GetPrimaryLen,EnumSystemLocalesA, 18_2_003159F6
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s, 18_2_00315A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea, 18_2_00319A32
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat, 18_2_00319B0C
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l, 18_2_0031AB56
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW, 18_2_0031148E
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 18_2_00315507
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA, 18_2_003155FC
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free, 18_2_00314DEA
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: GetLocaleInfoW,_GetPrimaryLen,_strlen, 18_2_003156A3
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage, 18_2_003156FE
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe Code function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement, 18_2_0030AFFD
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DA239A GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_00DA239A
Source: C:\Users\user\Desktop\Package_details.exe Code function: 0_2_00DB8CC9 GetUserNameA,CreateFileW,WriteFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessW, 0_2_00DB8CC9
Source: C:\Users\user\Desktop\Package_details.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Source: C:\Users\user\Desktop\Package_details.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\Package_details.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\Package_details.exe WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RAT
Source: Yara match File source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Detected Nanocore Rat
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Package_details.exe, 00000002.00000003.223529798.0000000004BEB000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Package_details.exe, 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe String found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000000C.00000002.255256887.000000000365E000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: Package_details.exe, 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp String found in binary or memory: NanoCore.ClientPluginHost
Source: Package_details.exe String found in binary or memory: NanoCore.ClientPluginHost
Source: Package_details.exe, 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe String found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp String found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Yara detected Nanocore RAT
Source: Yara match File source: 0000000C.00000002.254234385.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279047270.0000000002F10000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.265645463.0000000000BA0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.256685765.0000000001110000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279458357.00000000042D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255480144.00000000057B2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.273459332.0000000003EC1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270080502.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269469613.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278607358.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.278916305.0000000001444000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.216025049.0000000001890000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.269644528.0000000000966000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.250138622.00000000024A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.254375322.00000000013D8000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.243043280.0000000002970000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255432280.0000000005760000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.239365689.00000000024E0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.270811037.0000000002AD2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000015.00000002.279548840.0000000005472000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.255293475.0000000004651000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 6532, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 5804, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4604, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 5712, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 2140, type: MEMORY
Source: Yara match File source: Process Memory Space: dhcpmon.exe PID: 4112, type: MEMORY
Source: Yara match File source: Process Memory Space: Package_details.exe PID: 6304, type: MEMORY
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.5470000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.dhcpmon.exe.ba0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.dhcpmon.exe.24a0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2970000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.5760000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.dhcpmon.exe.2970000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.Package_details.exe.1890000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.Package_details.exe.1110000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.Package_details.exe.24e0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.dhcpmon.exe.57b0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 21.2.dhcpmon.exe.2f10000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.Package_details.exe.2ad0000.3.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 321402 Sample: Package_details.exe Startdate: 21/11/2020 Architecture: WINDOWS Score: 100 70 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 Multi AV Scanner detection for dropped file 2->74 76 11 other signatures 2->76 8 Package_details.exe 3 2->8         started        12 Package_details.exe 1 2->12         started        14 dhcpmon.exe 1 2->14         started        16 dhcpmon.exe 1 2->16         started        process3 file4 62 C:\Users\user\AppData\Local\...\sysfonts.exe, PE32 8->62 dropped 64 C:\...\3b53dd4f8dbc40fcb4ebf67bcf9e21d3.xml, XML 8->64 dropped 82 Maps a DLL or memory area into another process 8->82 18 Package_details.exe 1 17 8->18         started        23 cmd.exe 1 8->23         started        25 Package_details.exe 1 12->25         started        27 Package_details.exe 12->27         started        29 dhcpmon.exe 3 14->29         started        31 dhcpmon.exe 1 16->31         started        33 dhcpmon.exe 16->33         started        signatures5 process6 dnsIp7 68 209.159.151.5, 24980, 49706 IS-AS-1US United States 18->68 52 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->52 dropped 54 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->54 dropped 56 C:\Users\user\AppData\Local\...\tmp30A7.tmp, XML 18->56 dropped 58 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->58 dropped 78 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->78 35 schtasks.exe 1 18->35         started        37 schtasks.exe 1 18->37         started        39 conhost.exe 23->39         started        41 schtasks.exe 1 23->41         started        80 Maps a DLL or memory area into another process 25->80 43 Package_details.exe 3 25->43         started        60 C:\Users\user\AppData\...\dhcpmon.exe.log, ASCII 29->60 dropped 46 dhcpmon.exe 2 31->46         started        file8 signatures9 process10 file11 48 conhost.exe 35->48         started        50 conhost.exe 37->50         started        66 C:\Users\user\...\Package_details.exe.log, ASCII 43->66 dropped process12
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
209.159.151.5
unknown United States
19318 IS-AS-1US true