Loading ...

Play interactive tourEdit tour

Analysis Report PO456789.exe

Overview

General Information

Sample Name:PO456789.exe
Analysis ID:322271
MD5:6997fbda2b03ac3c34fec92ed6375e40
SHA1:4d16de6b50332cc05fca066125937c364dda961f
SHA256:6ed6aebe6d0b839ab5a5bebad7d58d72445146afa8ee9742f9b0e287f007b3c4

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Protects its processes via BreakOnTermination flag
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • PO456789.exe (PID: 5916 cmdline: 'C:\Users\user\Desktop\PO456789.exe' MD5: 6997FBDA2B03AC3C34FEC92ED6375E40)
    • cmd.exe (PID: 4228 cmdline: 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5988 cmdline: 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • fifyt.exe (PID: 6272 cmdline: C:\Users\user\AppData\Local\fifyt.exe MD5: 6997FBDA2B03AC3C34FEC92ED6375E40)
        • cmd.exe (PID: 4940 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 4780 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • InstallUtil.exe (PID: 6712 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
          • schtasks.exe (PID: 6716 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
            • conhost.exe (PID: 6952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • schtasks.exe (PID: 6996 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
            • conhost.exe (PID: 6924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 6732 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6776 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 6692 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6968 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 204 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 4228 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 6112 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 2240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 5920 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 7160 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 7028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6896 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 6988 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6996 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
  • InstallUtil.exe (PID: 4812 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0 MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 4864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • fifyt.exe (PID: 5048 cmdline: 'C:\Users\user\AppData\Local\fifyt.exe' MD5: 6997FBDA2B03AC3C34FEC92ED6375E40)
    • InstallUtil.exe (PID: 7016 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • dhcpmon.exe (PID: 6560 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.244.30.212"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 40 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    9.2.InstallUtil.exe.62c0000.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xd9ad:$x1: NanoCore.ClientPluginHost
    • 0xd9da:$x2: IClientNetworkHost
    9.2.InstallUtil.exe.62c0000.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xd9ad:$x2: NanoCore.ClientPluginHost
    • 0xea88:$s4: PipeCreated
    • 0xd9c7:$s5: IClientLoggingHost
    9.2.InstallUtil.exe.62c0000.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      9.2.InstallUtil.exe.5530000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      9.2.InstallUtil.exe.5530000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      Click to see the 11 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6712, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentProcessId: 6712, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp', ProcessId: 6716

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: InstallUtil.exe.7016.32.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.244.30.212"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: 9.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 9.2.InstallUtil.exe.62c0000.4.unpackAvira: Label: TR/NanoCore.fadte
      Source: 32.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_02BFE2E8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_02BFEDA8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_02BFEDA8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_02BFF0C8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_02BFF0C8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_02BFE8C4
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then xor edx, edx0_2_02BFEFF4
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_02BFED9C
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_02BFED9C
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_02BFF0BC
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_02BFF0BC
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then xor edx, edx0_2_02BFF000
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov ecx, dword ptr [03DEE69Ch]0_2_02BF7A18
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]0_2_02BF7A18
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h5_2_00B7E2E8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]5_2_00B7EDA8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh5_2_00B7EDA8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]5_2_00B7F0C8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh5_2_00B7F0C8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h5_2_00B7E8C4
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]5_2_00B7ED9C
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh5_2_00B7ED9C
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx5_2_00B7EFF4
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]5_2_00B7F0BC
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh5_2_00B7F0BC
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx5_2_00B7F000
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov ecx, dword ptr [0351E69Ch]5_2_00B77A18
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_00B77A18
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h26_2_02A4E2E8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]26_2_02A4F0C8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh26_2_02A4F0C8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]26_2_02A4EDA8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh26_2_02A4EDA8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]26_2_02A4F0BC
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh26_2_02A4F0BC
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx26_2_02A4F000
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h26_2_02A4E8C4
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx26_2_02A4EFF4
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]26_2_02A4ED9C
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh26_2_02A4ED9C

      Networking:

      barindex
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 185.244.30.212 ports 57689,5,6,7,8,9
      Source: global trafficTCP traffic: 105.112.96.12 ports 57689,5,6,7,8,9
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: smithcity123.ddns.net
      Source: global trafficTCP traffic: 192.168.2.4:49733 -> 105.112.96.12:57689
      Source: global trafficTCP traffic: 192.168.2.4:49765 -> 185.244.30.212:57689
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: Joe Sandbox ViewASN Name: VNL1-ASNG VNL1-ASNG
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownDNS traffic detected: queries for: smithcity123.ddns.net
      Source: PO456789.exe, 00000000.00000002.665138139.00000000011AA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: InstallUtil.exe, 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Operating System Destruction:

      barindex
      Protects its processes via BreakOnTermination flagShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: 01 00 00 00 Jump to behavior

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 9.2.InstallUtil.exe.5530000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      .NET source code contains very large array initializationsShow sources
      Source: PO456789.exe, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 0.2.PO456789.exe.a10000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 0.0.PO456789.exe.a10000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: fifyt.exe.1.dr, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 5.2.fifyt.exe.1c0000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 5.0.fifyt.exe.1c0000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 26.0.fifyt.exe.860000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 26.2.fifyt.exe.860000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF42B80_2_02BF42B8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF24980_2_02BF2498
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF2F900_2_02BF2F90
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF5D780_2_02BF5D78
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF42A80_2_02BF42A8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF24930_2_02BF2493
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BFAB380_2_02BFAB38
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF2F830_2_02BF2F83
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF7A180_2_02BF7A18
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BFF8800_2_02BFF880
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BFF8700_2_02BFF870
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF5D680_2_02BF5D68
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B742B85_2_00B742B8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B724985_2_00B72498
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B72F905_2_00B72F90
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B75D785_2_00B75D78
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B742A85_2_00B742A8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7248A5_2_00B7248A
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7AB385_2_00B7AB38
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B72F825_2_00B72F82
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7F8805_2_00B7F880
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7F8705_2_00B7F870
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B77A185_2_00B77A18
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B75D685_2_00B75D68
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_0501E4719_2_0501E471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_0501E4809_2_0501E480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_0501BBD49_2_0501BBD4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_067800409_2_06780040
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 21_2_010107C821_2_010107C8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A442A826_2_02A442A8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4248B26_2_02A4248B
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A42F8326_2_02A42F83
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A45D6826_2_02A45D68
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4AB3826_2_02A4AB38
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4F88026_2_02A4F880
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4F87026_2_02A4F870
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_002520B027_2_002520B0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_00BB07C827_2_00BB07C8
      Source: PO456789.exe, 00000000.00000002.670141096.0000000008E90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.665138139.00000000011AA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.670354069.0000000008F90000.00000002.00000001.sdmpBinary or memory string: originalfilename vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.670354069.0000000008F90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.668951948.00000000054D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.664827057.0000000000AA4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameStub37.exe. vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.665964234.0000000003DF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDESdgdhser.dll0 vs PO456789.exe
      Source: PO456789.exeBinary or memory string: OriginalFilenameStub37.exe. vs PO456789.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 9.2.InstallUtil.exe.5530000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.5530000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: fifyt.exe, 00000005.00000002.923643082.0000000008DB3000.00000004.00000001.sdmpBinary or memory string: ft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBp+' .
      Source: classification engineClassification label: mal100.troj.evad.winEXE@220/11@6/2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO456789.exe.logJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6264:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6952:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7028:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2240:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6792:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5616:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6924:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6544:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{adbd9fab-b8d2-4b8b-b8ff-e45b2d6b4946}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4864:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4816:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC4E7.tmpJump to behavior
      Source: PO456789.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PO456789.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Local\fifyt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\PO456789.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\PO456789.exe 'C:\Users\user\Desktop\PO456789.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\AppData\Local\fifyt.exe C:\Users\user\AppData\Local\fifyt.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Local\fifyt.exe 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\fifyt.exe C:\Users\user\AppData\Local\fifyt.exeJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\Desktop\PO456789.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\PO456789.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: PO456789.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: PO456789.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: dhcpmon.exe, 0000001B.00000002.697779760.0000000000252000.00000002.00020000.sdmp, dhcpmon.exe.9.dr
      Source: Binary string: InstallUtil.pdb source: dhcpmon.exe, dhcpmon.exe.9.dr

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_00A123E2 push edx; iretd 0_2_00A123E5
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_00A123C9 pushfd ; iretd 0_2_00A123CA
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_00A1249D push 75C6687Ch; iretd 0_2_00A124A2
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_001C249D push 75C6687Ch; iretd 5_2_001C24A2
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_001C23C9 pushfd ; iretd 5_2_001C23CA
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_001C23E2 push edx; iretd 5_2_001C23E5
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_008623C9 pushfd ; iretd 26_2_008623CA
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_0086249D push 75C6687Ch; iretd 26_2_008624A2
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_008623E2 push edx; iretd 26_2_008623E5
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

      Persistence and Installation Behavior:

      barindex
      Uses cmd line tools excessively to alter registry or file dataShow sources
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\fifyt.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run fiffytJump to behavior
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run fiffytJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\PO456789.exeFile opened: C:\Users\user\Desktop\PO456789.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeFile opened: C:\Users\user\AppData\Local\fifyt.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeFile opened: C:\Users\user\AppData\Local\fifyt.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Local\fifyt.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: PO456789.exe, 00000000.00000002.665964234.0000000003DF1000.00000004.00000001.sdmp, fifyt.exe, 00000005.00000002.918713126.0000000003521000.00000004.00000001.sdmp, fifyt.exe, 0000001A.00000002.918721922.0000000003C41000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL!:ZONE.IDENTIFIER
      Source: C:\Users\user\AppData\Local\fifyt.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 5700Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3741Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: foregroundWindowGot 790Jump to behavior
      Source: C:\Users\user\Desktop\PO456789.exe TID: 5688Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 5744Thread sleep count: 35 > 30Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 5744Thread sleep time: -35000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5992Thread sleep time: -15679732462653109s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5708Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 940Thread sleep count: 66 > 30
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 940Thread sleep time: -66000s >= -30000s
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 7024Thread sleep count: 61 > 30
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 7024Thread sleep time: -30500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5660Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6812Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: InstallUtil.exe, 00000009.00000002.922353103.0000000006540000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
      Source: PO456789.exe, 00000000.00000002.665964234.0000000003DF1000.00000004.00000001.sdmp, fifyt.exe, 00000005.00000002.918713126.0000000003521000.00000004.00000001.sdmp, fifyt.exe, 0000001A.00000002.918721922.0000000003C41000.00000004.00000001.sdmpBinary or memory string: VirtualMachineDetector
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\PO456789.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\fifyt.exe C:\Users\user\AppData\Local\fifyt.exeJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknownJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.918861771.0000000003085000.00000004.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.917765494.00000000014E0000.00000002.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.917765494.00000000014E0000.00000002.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.917765494.00000000014E0000.00000002.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Users\user\Desktop\PO456789.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Users\user\AppData\Local\fifyt.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Users\user\AppData\Local\fifyt.exe VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\PO456789.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: PO456789.exe, 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: fifyt.exe, 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: fifyt.exe, 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection12Disable or Modify Tools1Input Capture21File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery12Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSSecurity Software Discovery111Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsVirtualization/Sandbox Evasion3SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonModify Registry1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion3DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection12Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 322271 Sample: PO456789.exe Startdate: 24/11/2020 Architecture: WINDOWS Score: 100 82 Found malware configuration 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 Sigma detected: Scheduled temp file as task from temp location 2->86 88 9 other signatures 2->88 10 PO456789.exe 2 2->10         started        13 fifyt.exe 2->13         started        15 InstallUtil.exe 2->15         started        17 dhcpmon.exe 2->17         started        process3 signatures4 96 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->96 19 cmd.exe 1 10->19         started        21 cmd.exe 2 10->21         started        24 InstallUtil.exe 13->24         started        26 conhost.exe 15->26         started        28 conhost.exe 17->28         started        process5 file6 30 fifyt.exe 1 19->30         started        33 conhost.exe 19->33         started        70 C:\Users\user\AppData\Local\fifyt.exe, PE32 21->70 dropped 35 conhost.exe 21->35         started        process7 signatures8 98 Hides that the sample has been downloaded from the Internet (zone.identifier) 30->98 37 InstallUtil.exe 1 11 30->37         started        42 cmd.exe 1 30->42         started        44 cmd.exe 1 30->44         started        46 5 other processes 30->46 process9 dnsIp10 78 smithcity123.ddns.net 105.112.96.12, 57689 VNL1-ASNG Nigeria 37->78 80 185.244.30.212, 49765, 49766, 49767 DAVID_CRAIGGG Netherlands 37->80 72 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 37->72 dropped 74 C:\Users\user\AppData\Local\...\tmpC4E7.tmp, XML 37->74 dropped 76 C:\Program Files (x86)\...\dhcpmon.exe, PE32 37->76 dropped 90 Protects its processes via BreakOnTermination flag 37->90 92 Hides that the sample has been downloaded from the Internet (zone.identifier) 37->92 48 schtasks.exe 37->48         started        50 schtasks.exe 37->50         started        94 Uses cmd line tools excessively to alter registry or file data 42->94 52 conhost.exe 42->52         started        54 reg.exe 1 1 42->54         started        56 conhost.exe 44->56         started        58 reg.exe 1 44->58         started        60 conhost.exe 46->60         started        62 reg.exe 46->62         started        64 8 other processes 46->64 file11 signatures12 process13 process14 66 conhost.exe 48->66         started        68 conhost.exe 50->68         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      9.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      9.2.InstallUtil.exe.62c0000.4.unpack100%AviraTR/NanoCore.fadteDownload File
      32.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      smithcity123.ddns.net
      105.112.96.12
      truetrue
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.244.30.212
        unknownNetherlands
        209623DAVID_CRAIGGGtrue
        105.112.96.12
        unknownNigeria
        36873VNL1-ASNGtrue

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:322271
        Start date:24.11.2020
        Start time:20:29:45
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 11m 40s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:PO456789.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:40
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@220/11@6/2
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 0.6% (good quality ratio 0.3%)
        • Quality average: 39.3%
        • Quality standard deviation: 41.2%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 81
        • Number of non-executed functions: 5
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • Exclude process from analysis (whitelisted): backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 40.88.32.150, 13.88.21.125, 51.104.144.132, 93.184.221.240, 52.155.217.156, 20.54.26.129, 92.122.213.247, 92.122.213.194, 51.11.168.160
        • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, wu.ec.azureedge.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        20:30:46AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run fiffyt C:\Users\user\AppData\Local\fifyt.exe
        20:30:52Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" s>$(Arg0)
        20:30:52API Interceptor923x Sleep call for process: InstallUtil.exe modified
        20:30:54Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
        20:30:54AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        20:31:02AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run fiffyt C:\Users\user\AppData\Local\fifyt.exe

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        smithcity123.ddns.netFXlRSXcN37.exeGet hashmaliciousBrowse
        • 185.165.153.124

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        DAVID_CRAIGGGkelvinx.exeGet hashmaliciousBrowse
        • 185.140.53.132
        Order-2311.exeGet hashmaliciousBrowse
        • 91.193.75.147
        YZD221120.exeGet hashmaliciousBrowse
        • 91.193.75.147
        ORDER #201120A.exeGet hashmaliciousBrowse
        • 185.244.30.92
        oUI0jQS8xQ.exeGet hashmaliciousBrowse
        • 185.140.53.149
        Quotation ATB-PR28500KINH.exeGet hashmaliciousBrowse
        • 185.140.53.139
        Quotation ATB-PR28500KINH.exeGet hashmaliciousBrowse
        • 185.140.53.139
        Ups file de.exeGet hashmaliciousBrowse
        • 185.140.53.221
        NyUnwsFSCa.exeGet hashmaliciousBrowse
        • 185.140.53.149
        purchase order.exeGet hashmaliciousBrowse
        • 185.140.53.233
        Remittance Details.xlsGet hashmaliciousBrowse
        • 185.140.53.184
        PaymentConfirmation.exeGet hashmaliciousBrowse
        • 185.140.53.183
        ORDER #02676.doc.exeGet hashmaliciousBrowse
        • 185.244.30.92
        b11305c6ab207f830062f80eeec728c4.exeGet hashmaliciousBrowse
        • 185.140.53.233
        ShippingDoc.jarGet hashmaliciousBrowse
        • 185.244.30.139
        1kn1ejwPxi.exeGet hashmaliciousBrowse
        • 185.140.53.132
        D6vy84I7rJ.exeGet hashmaliciousBrowse
        • 185.140.53.149
        7iatifHQEp.exeGet hashmaliciousBrowse
        • 185.140.53.132
        Sbext4ZNBq.exeGet hashmaliciousBrowse
        • 185.140.53.197
        xEdiPz1bC3.exeGet hashmaliciousBrowse
        • 185.140.53.234
        VNL1-ASNGDHL_10177_R293_DOCUMENT.exeGet hashmaliciousBrowse
        • 105.112.101.201
        ibgcrnNmhB.exeGet hashmaliciousBrowse
        • 105.112.25.130
        purchase order.exeGet hashmaliciousBrowse
        • 105.112.25.74
        packing list.xlsx.exeGet hashmaliciousBrowse
        • 105.112.69.142
        9087654.exeGet hashmaliciousBrowse
        • 105.112.101.151
        RFQ.exeGet hashmaliciousBrowse
        • 105.112.100.239
        LOI.exeGet hashmaliciousBrowse
        • 105.112.100.239
        corporate-tax.exeGet hashmaliciousBrowse
        • 105.112.101.84
        QUOTATION - COVID 19 PROTECTION SOLUTIONS - final.exeGet hashmaliciousBrowse
        • 105.112.124.8
        BDH9YAC4aQ.exeGet hashmaliciousBrowse
        • 105.112.101.125
        JBIY8HTthL.exeGet hashmaliciousBrowse
        • 105.112.101.125
        late-payment.exeGet hashmaliciousBrowse
        • 105.112.45.74
        Doc0_01210_72820.exeGet hashmaliciousBrowse
        • 105.112.100.246
        newageGet hashmaliciousBrowse
        • 105.120.247.26
        54PDF Enclosed October Order.exeGet hashmaliciousBrowse
        • 105.112.32.190
        47PDF Enclosed PO.exeGet hashmaliciousBrowse
        • 105.112.42.182
        Packing List Detail.exeGet hashmaliciousBrowse
        • 105.112.37.223
        5INQUIRY.exeGet hashmaliciousBrowse
        • 105.112.96.111
        20New Enquiry.exeGet hashmaliciousBrowse
        • 105.112.98.252
        PDF.Order#P.O.3041.exeGet hashmaliciousBrowse
        • 105.112.96.11

        JA3 Fingerprints

        No context

        Dropped Files

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe31.exeGet hashmaliciousBrowse
          ORDER FORM DENK.exeGet hashmaliciousBrowse
            niMONOdcTZ.exeGet hashmaliciousBrowse
              XiCfDFLACR.exeGet hashmaliciousBrowse
                Q7kSO3iJN3.exeGet hashmaliciousBrowse
                  BL, Invoices.exeGet hashmaliciousBrowse
                    crypt.exeGet hashmaliciousBrowse
                      IEcYhddAMD.exeGet hashmaliciousBrowse
                        FRI5A2QZI7.exeGet hashmaliciousBrowse
                          kM16L0Vybr.exeGet hashmaliciousBrowse
                            SecuriteInfo.com.Generic.mg.e1df690a980825ac.exeGet hashmaliciousBrowse
                              9SI5dPQJ7G.exeGet hashmaliciousBrowse
                                FH11m70Scj.exeGet hashmaliciousBrowse
                                  http://cdn.discordapp.com/attachments/776234221668270104/776349109195898880/AWB_DHL733918737WA56301224799546260.pdf.7zGet hashmaliciousBrowse
                                    bKs9QjrX1q.exeGet hashmaliciousBrowse
                                      Y7ET38qc5y.exeGet hashmaliciousBrowse
                                        IIOCxnn1ho.exeGet hashmaliciousBrowse
                                          Jn3wr6uaNK.exeGet hashmaliciousBrowse
                                            ODoXtvoj7j.exeGet hashmaliciousBrowse
                                              jG1KyDSHKK.exeGet hashmaliciousBrowse

                                                Created / dropped Files

                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):41064
                                                Entropy (8bit):6.164873449128079
                                                Encrypted:false
                                                SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: 31.exe, Detection: malicious, Browse
                                                • Filename: ORDER FORM DENK.exe, Detection: malicious, Browse
                                                • Filename: niMONOdcTZ.exe, Detection: malicious, Browse
                                                • Filename: XiCfDFLACR.exe, Detection: malicious, Browse
                                                • Filename: Q7kSO3iJN3.exe, Detection: malicious, Browse
                                                • Filename: BL, Invoices.exe, Detection: malicious, Browse
                                                • Filename: crypt.exe, Detection: malicious, Browse
                                                • Filename: IEcYhddAMD.exe, Detection: malicious, Browse
                                                • Filename: FRI5A2QZI7.exe, Detection: malicious, Browse
                                                • Filename: kM16L0Vybr.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Generic.mg.e1df690a980825ac.exe, Detection: malicious, Browse
                                                • Filename: 9SI5dPQJ7G.exe, Detection: malicious, Browse
                                                • Filename: FH11m70Scj.exe, Detection: malicious, Browse
                                                • Filename: , Detection: malicious, Browse
                                                • Filename: bKs9QjrX1q.exe, Detection: malicious, Browse
                                                • Filename: Y7ET38qc5y.exe, Detection: malicious, Browse
                                                • Filename: IIOCxnn1ho.exe, Detection: malicious, Browse
                                                • Filename: Jn3wr6uaNK.exe, Detection: malicious, Browse
                                                • Filename: ODoXtvoj7j.exe, Detection: malicious, Browse
                                                • Filename: jG1KyDSHKK.exe, Detection: malicious, Browse
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):329
                                                Entropy (8bit):5.324195011891804
                                                Encrypted:false
                                                SSDEEP:6:Q3La/xwc1K9rDLIP12MUAvvr3tDLIP12MUAvvR+uTL2LDY3U21v:Q3La/h1K9rDLI4M9tDLI4MWuPk21v
                                                MD5:0F3825E2D8885E05820523A5D8DFEF9C
                                                SHA1:E6AA2D5D00CE5F875C75B9490F21F2D6B3F0DED3
                                                SHA-256:2F3769543004FF49CB3B6EF06AC5FD6A402DB0C2546E365639338CA2F4049EBE
                                                SHA-512:D8FBAEEABF2D33EAF4FF5AADEBF86C233145502560A42B88EBDE455AE2B001F52728E4CE6C59DBCCA37CBF25BA485F5FC5527E992AB66957C6252CF1956F237C
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO456789.exe.log
                                                Process:C:\Users\user\Desktop\PO456789.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1546
                                                Entropy (8bit):5.346743488670314
                                                Encrypted:false
                                                SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovjHKx1qHj:iqXeqm00YqhQnouRqjorqxwD
                                                MD5:EC192028815A73A0E57822511039BF45
                                                SHA1:56B71389DEC83E8077FC8AF6DA490430EA64190F
                                                SHA-256:3827EF46D6BAB96F1ABAEAEFF5ABF04569543CD10E8AA6113B4DB419D6E5B03E
                                                SHA-512:0CBDE42DF33CC0B5CE880A14996F7F7ACA6BA398468952A609046BA7E37243554B04E4B7856CC1318333AC142B8D432D4B1BF2A0434E12BF80387A671F64B991
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):329
                                                Entropy (8bit):5.324195011891804
                                                Encrypted:false
                                                SSDEEP:6:Q3La/xwc1K9rDLIP12MUAvvr3tDLIP12MUAvvR+uTL2LDY3U21v:Q3La/h1K9rDLI4M9tDLI4MWuPk21v
                                                MD5:0F3825E2D8885E05820523A5D8DFEF9C
                                                SHA1:E6AA2D5D00CE5F875C75B9490F21F2D6B3F0DED3
                                                SHA-256:2F3769543004FF49CB3B6EF06AC5FD6A402DB0C2546E365639338CA2F4049EBE
                                                SHA-512:D8FBAEEABF2D33EAF4FF5AADEBF86C233145502560A42B88EBDE455AE2B001F52728E4CE6C59DBCCA37CBF25BA485F5FC5527E992AB66957C6252CF1956F237C
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1324
                                                Entropy (8bit):5.130789568721151
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mlxtn:cbk4oL600QydbQxIYODOLedq3Zlj
                                                MD5:576BBAF398045C3843D452EC83208236
                                                SHA1:8ED5B2500AE7A40CBFA6E9018A1D1F1E70CB1374
                                                SHA-256:33C0C2D72FA383E5988CE640FEBC5AC6A2BD71D4AE660B99E52234952E17467B
                                                SHA-512:E7CC0EA0B351C6A8618E14F03C00E88EF83E2F169E0B4D66513F580F0A9352FBFE429E57186362B69407150D566BBDADCA2F7B574FC748CC140B3249BE67F96A
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\Temp\tmpC96C.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1310
                                                Entropy (8bit):5.109425792877704
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                Malicious:false
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\fifyt.exe
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):595456
                                                Entropy (8bit):6.277264014356029
                                                Encrypted:false
                                                SSDEEP:12288:Gn5PqttqmMwFHo3ggmmz7dBfRdGacGJQb+oT8:YlqSmMwFHQggvzBBfRdGac+
                                                MD5:6997FBDA2B03AC3C34FEC92ED6375E40
                                                SHA1:4D16DE6B50332CC05FCA066125937C364DDA961F
                                                SHA-256:6ED6AEBE6D0B839AB5A5BEBAD7D58D72445146AFA8EE9742F9B0E287F007B3C4
                                                SHA-512:C10EFA2A625D3BCCD43B81BC9EDFF5CA43FF9B6D57E8185C111DA7496FC0CDB23706DE9CEA1D8ADD20ECB7B1F252290DA68C3A37A73585C1419C8C56B6C574AC
                                                Malicious:true
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......D............................n*... ...@....@.. ....................................`..................................*..O....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P*......H............*......V......&\...........................................z....;y....E.(Z..l........X8...F.5._.[{.....Q..l./...FQ.ED......2...f...AU...[......>tM.S<....>.o.f........1(aPs..X.B.z.].'J...$.i._Dp.....>.f.Z....C!.....s..b+N..+.....2&...n6.R..e'.......n.(....#...?qt....d.?.Uq./T...k<Wu....k....A..-.....c... s>>F..P...{.N.a\..3.....`|...{.'^@.S...+_`..7.........9......'u \...P.0$..E}..y..O.....eL...\.z.^fB&....bW.o.9.6....cm.....tG.C..\.RG.H..
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:GXK3tn:AKdn
                                                MD5:274BB67DF1F631159FB981CAE1616E40
                                                SHA1:F87AEE2FB9B9568ECF78E441AE04EEC5AB9CF4BC
                                                SHA-256:EEB9380E9350BDDEDB8BE2332F7A9AC5D08732853279AED361B55DA0933CE9D6
                                                SHA-512:1ABFA469868A8F3AAF96646CC58C179CD7393A38B83B80C29C7B149AD76D0C648898F8631790F48A8D28164C672FB5EB3C02EB167AD2500C398302718F7B8064
                                                Malicious:true
                                                Preview: o..r...H
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):61
                                                Entropy (8bit):4.84649200170358
                                                Encrypted:false
                                                SSDEEP:3:oMty8WddSNARI0dAn:oMLW6qRndA
                                                MD5:1EFF0939B507F9B297DCB06A4C0413B8
                                                SHA1:8131E01D9969CD60A0241E71727E56749AB53B31
                                                SHA-256:C8BBFDF650E881719F8E623E5FF54AAFE25B64B351E44077B511071AB08AE903
                                                SHA-512:81E8AE0346984643A56CA92323F7687E648130AB61A5AA8E4706DD1B2FC56B1974C06923003343B53391E1018D07BA5090222899F5FA4F4F8327995763BF84FE
                                                Malicious:false
                                                Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                \Device\ConDrv
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):359
                                                Entropy (8bit):4.8928974699064005
                                                Encrypted:false
                                                SSDEEP:6:zx3M7bWXRLuRc4LQtUmYRZBXVNYxxEQgz3MBL3RgKRLLyqbbUcfvfAL/BM7GRJpF:zKnWXQRzA4BFNYxx5ggBDX7HfvfU66rF
                                                MD5:1CEB9B01195234DD4E4CEBEFC4425CA6
                                                SHA1:674D41B247D4F20F5C0F04DF476539555FD94EED
                                                SHA-256:9A941C6BA5D12DF1D05D345125CA38DCA56C2BE4FF4FEF02B29C4B4F4E67B433
                                                SHA-512:0FCDF334529F9F659D53666EE4F33216A6BB58E52BDA61181A0E7EC75FDD1FA8A681C4FA8CC671372D7F8089AD94C7C12DCA85BBC50A2182C265D79AFEC4796C
                                                Malicious:false
                                                Preview: Microsoft (R) .NET Framework Installation utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....Exception occurred while initializing the installation:..System.IO.FileNotFoundException: Could not load file or assembly 'file:///C:\Windows\system32\0' or one of its dependencies. The system cannot find the file specified....

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.277264014356029
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:PO456789.exe
                                                File size:595456
                                                MD5:6997fbda2b03ac3c34fec92ed6375e40
                                                SHA1:4d16de6b50332cc05fca066125937c364dda961f
                                                SHA256:6ed6aebe6d0b839ab5a5bebad7d58d72445146afa8ee9742f9b0e287f007b3c4
                                                SHA512:c10efa2a625d3bccd43b81bc9edff5ca43ff9b6d57e8185c111da7496fc0cdb23706de9cea1d8add20ecb7b1f252290da68c3a37a73585c1419c8c56b6c574ac
                                                SSDEEP:12288:Gn5PqttqmMwFHo3ggmmz7dBfRdGacGJQb+oT8:YlqSmMwFHQggvzBBfRdGac+
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......D............................n*... ...@....@.. ....................................`................................

                                                File Icon

                                                Icon Hash:00828e8e8686b000

                                                Static PE Info

                                                General

                                                Entrypoint:0x492a6e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                Time Stamp:0x44ECE4BC [Wed Aug 23 23:29:00 2006 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x92a1c0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x596.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x960000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x90a740x90c00False0.590951870142data6.28617887105IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0x940000x5960x600False0.4140625data4.06252531054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x960000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0x940a00x30cdata
                                                RT_MANIFEST0x943ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright 2020
                                                Assembly Version1.0.0.0
                                                InternalNameStub37.exe
                                                FileVersion1.0.0.0
                                                CompanyName
                                                LegalTrademarks
                                                Comments
                                                ProductNameStub37
                                                ProductVersion1.0.0.0
                                                FileDescriptionStub37
                                                OriginalFilenameStub37.exe

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 24, 2020 20:30:54.693972111 CET4973357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:30:57.750633955 CET4973357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:03.915282011 CET4973357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:12.010874033 CET4974157689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:15.025546074 CET4974157689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:21.026057005 CET4974157689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:29.038765907 CET4975457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:32.042599916 CET4975457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:38.074345112 CET4975457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:45.705604076 CET4976557689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:45.764708042 CET5768949765185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:46.278141022 CET4976557689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:46.337778091 CET5768949765185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:46.840739012 CET4976557689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:46.900777102 CET5768949765185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:51.232747078 CET4976657689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:51.292907000 CET5768949766185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:51.794209957 CET4976657689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:51.854765892 CET5768949766185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:52.357130051 CET4976657689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:52.416743040 CET5768949766185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:56.420990944 CET4976757689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:56.480937958 CET5768949767185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:56.982134104 CET4976757689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:57.041433096 CET5768949767185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:57.545876980 CET4976757689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:57.605487108 CET5768949767185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:32:01.706033945 CET4976857689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:04.701545954 CET4976857689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:10.702197075 CET4976857689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:18.344161987 CET4977357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:21.359322071 CET4977357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:27.359617949 CET4977357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:35.016170979 CET4977457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:38.016824007 CET4977457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:44.017311096 CET4977457689192.168.2.4105.112.96.12

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 24, 2020 20:30:44.678797007 CET4991053192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:44.705682993 CET53499108.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:45.484963894 CET5585453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:45.511976957 CET53558548.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:46.542421103 CET6454953192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:46.569574118 CET53645498.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:53.437715054 CET6315353192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:53.464725018 CET53631538.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:54.643064976 CET5299153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:54.680453062 CET53529918.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:54.845729113 CET5370053192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:54.872944117 CET53537008.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:57.835988998 CET5172653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:57.871826887 CET53517268.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:58.538731098 CET5679453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:58.565850973 CET53567948.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:58.579524040 CET5653453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:58.606662035 CET53565348.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:59.639020920 CET5662753192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:59.674792051 CET53566278.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:03.403490067 CET5662153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:03.469991922 CET53566218.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:11.971190929 CET6311653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:12.008527994 CET53631168.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:19.328739882 CET6407853192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:19.355988026 CET53640788.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:19.775859118 CET6480153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:19.802894115 CET53648018.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:20.135490894 CET6172153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:20.171039104 CET53617218.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:20.777755022 CET5125553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:20.818367958 CET53512558.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:21.131675959 CET6152253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:21.167100906 CET53615228.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:21.787940979 CET5233753192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:21.823509932 CET53523378.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:22.114726067 CET5504653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:22.141712904 CET53550468.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:22.455543995 CET4961253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:22.490964890 CET53496128.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:22.878814936 CET4928553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:22.914417982 CET53492858.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:23.341555119 CET5060153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:23.368742943 CET53506018.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:23.615839005 CET6087553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:23.618319988 CET5644853192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:23.642846107 CET53608758.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:23.664068937 CET53564488.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:28.986315966 CET5917253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:29.021948099 CET53591728.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:35.705284119 CET6242053192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:35.732440948 CET53624208.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:37.506514072 CET6057953192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:37.543237925 CET53605798.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:38.117646933 CET5018353192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:38.144689083 CET53501838.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:39.269773960 CET6153153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:39.296787977 CET53615318.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:39.942400932 CET4922853192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:39.969536066 CET53492288.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:40.963196993 CET5979453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:40.990212917 CET53597948.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:41.633445978 CET5591653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:41.660645008 CET53559168.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:01.647542000 CET5275253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:01.686784983 CET53527528.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:06.878326893 CET6054253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:06.905380011 CET53605428.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:07.612168074 CET6068953192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:07.648063898 CET53606898.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:11.721676111 CET6420653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:11.748917103 CET53642068.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:12.806418896 CET5090453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:12.844140053 CET53509048.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:18.290870905 CET5752553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:18.330842972 CET53575258.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:34.979161978 CET5381453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:35.014664888 CET53538148.8.8.8192.168.2.4

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Nov 24, 2020 20:30:54.643064976 CET192.168.2.48.8.8.80xd467Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:11.971190929 CET192.168.2.48.8.8.80xb0cbStandard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:28.986315966 CET192.168.2.48.8.8.80x1b84Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:01.647542000 CET192.168.2.48.8.8.80x37f5Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:18.290870905 CET192.168.2.48.8.8.80x91dcStandard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:34.979161978 CET192.168.2.48.8.8.80x43e2Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Nov 24, 2020 20:30:54.680453062 CET8.8.8.8192.168.2.40xd467No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:12.008527994 CET8.8.8.8192.168.2.40xb0cbNo error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:29.021948099 CET8.8.8.8192.168.2.40x1b84No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:01.686784983 CET8.8.8.8192.168.2.40x37f5No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:18.330842972 CET8.8.8.8192.168.2.40x91dcNo error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:35.014664888 CET8.8.8.8192.168.2.40x43e2No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)

                                                Code Manipulations

                                                Statistics

                                                CPU Usage

                                                Click to jump to process

                                                Memory Usage

                                                Click to jump to process

                                                High Level Behavior Distribution

                                                Click to dive into process behavior distribution

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:20:30:34
                                                Start date:24/11/2020
                                                Path:C:\Users\user\Desktop\PO456789.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\PO456789.exe'
                                                Imagebase:0xa10000
                                                File size:595456 bytes
                                                MD5 hash:6997FBDA2B03AC3C34FEC92ED6375E40
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:20:30:37
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:38
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:39
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:40
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:40
                                                Start date:24/11/2020
                                                Path:C:\Users\user\AppData\Local\fifyt.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Local\fifyt.exe
                                                Imagebase:0x1c0000
                                                File size:595456 bytes
                                                MD5 hash:6997FBDA2B03AC3C34FEC92ED6375E40
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:20:30:44
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:44
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:45
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:46
                                                Start date:24/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Imagebase:0x860000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:moderate

                                                General

                                                Start time:20:30:46
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:46
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:47
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:48
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:49
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:49
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
                                                Imagebase:0xf40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:49
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:50
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:50
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'
                                                Imagebase:0xf40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:51
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:52
                                                Start date:24/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0
                                                Imagebase:0x870000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET

                                                General

                                                Start time:20:30:52
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:53
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:53
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:54
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:54
                                                Start date:24/11/2020
                                                Path:C:\Users\user\AppData\Local\fifyt.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x860000
                                                File size:595456 bytes
                                                MD5 hash:6997FBDA2B03AC3C34FEC92ED6375E40
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                General

                                                Start time:20:30:54
                                                Start date:24/11/2020
                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                Imagebase:0x250000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Antivirus matches:
                                                • Detection: 0%, Metadefender, Browse
                                                • Detection: 0%, ReversingLabs

                                                General

                                                Start time:20:30:55
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:55
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:56
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:56
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:57
                                                Start date:24/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Imagebase:0x520000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                General

                                                Start time:20:30:58
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:59
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:59
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:31:01
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:31:01
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:31:02
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                Disassembly

                                                Code Analysis

                                                Reset < >

                                                  Executed Functions

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: ($<$Sz#5$ntin
                                                  • API String ID: 544645111-3877655761
                                                  • Opcode ID: ee5a7b36fc97c018ac3542bf05bbafbbcdd986ed86e1501fe0c6a60102f4adee
                                                  • Instruction ID: 1419853bafc986f8db2525ed7b961c8d21e206c1c64d8a22a6b63ac0fd6f6084
                                                  • Opcode Fuzzy Hash: ee5a7b36fc97c018ac3542bf05bbafbbcdd986ed86e1501fe0c6a60102f4adee
                                                  • Instruction Fuzzy Hash: D1A20474E042188FDB54CFA9C981A9DFBF6BF89304F25C199DA18AB245D730AE85CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: <$Sz#5$ntin
                                                  • API String ID: 544645111-1905908640
                                                  • Opcode ID: c9e7fc386becc186c4abf30dd8fde5307424e9227c46a93f753804e72f627051
                                                  • Instruction ID: 8f8bc12a7a26e0d2a0c1438b9ef8921cbc86b52140dd0de7fd565fd81f3968f6
                                                  • Opcode Fuzzy Hash: c9e7fc386becc186c4abf30dd8fde5307424e9227c46a93f753804e72f627051
                                                  • Instruction Fuzzy Hash: 3FE1B3B5E006198FDB58CFAAC9816DEFBF2BF88300F14C1A9D518AB264DB345A45CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: <$@
                                                  • API String ID: 0-1426351568
                                                  • Opcode ID: ac2d168e2a079ccc39e1823f61192493c90619926d4e97642549ec4485ae0f57
                                                  • Instruction ID: b71f5f1dba617c1ac3a8c5f1b2bf29a55a3e6b9abf6c14e6d9094eee8ad74230
                                                  • Opcode Fuzzy Hash: ac2d168e2a079ccc39e1823f61192493c90619926d4e97642549ec4485ae0f57
                                                  • Instruction Fuzzy Hash: 44628CB4E00269CFDB64DF69CA80A9DFBB2FF49305F16C1A9D908AB211D7349985CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: <$@
                                                  • API String ID: 0-1426351568
                                                  • Opcode ID: 6d4de79e8118a6ce4c1c4afa2b3c536ad966a349141a27f6bac8436a88ec2b55
                                                  • Instruction ID: 83d47c9c6587b1b5165b36b9c962a4f864751c43840180aaca32ab10f2d4acb0
                                                  • Opcode Fuzzy Hash: 6d4de79e8118a6ce4c1c4afa2b3c536ad966a349141a27f6bac8436a88ec2b55
                                                  • Instruction Fuzzy Hash: AD22C0B0901269CFEB64DF66CA44A89FBF2FF49705F16C1E9DA48AB211D7309984CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #
                                                  • API String ID: 0-1983530799
                                                  • Opcode ID: 0f668a14b8068c6ecb671d258bc4a20f244fb82a27169be09194ad705ac46ca1
                                                  • Instruction ID: 8a4d0f6909ea94c239ce2c29477db6f534e5f23fa21ba3ac2a1455055fdd7bce
                                                  • Opcode Fuzzy Hash: 0f668a14b8068c6ecb671d258bc4a20f244fb82a27169be09194ad705ac46ca1
                                                  • Instruction Fuzzy Hash: 2D32BFB0900299CFDB94DF69CA80A8DFBF2FB49615F56C1D9C548AB211CB309985CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #
                                                  • API String ID: 0-1983530799
                                                  • Opcode ID: 19c6dae9f407c81eca0b42c26fe37ebc95f13ae9ae66dbc7866ce62bd9453fff
                                                  • Instruction ID: baf22da5fc0747ad5cda503496536e0ac7bd2cef2ed840bfc0b4e895f90387a7
                                                  • Opcode Fuzzy Hash: 19c6dae9f407c81eca0b42c26fe37ebc95f13ae9ae66dbc7866ce62bd9453fff
                                                  • Instruction Fuzzy Hash: B551E571E006199FEB58DF6AC84079EBBF3AF89304F10C0AAC51CA7254DB304A85CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Sz#5
                                                  • API String ID: 0-1233133972
                                                  • Opcode ID: 0e3b6bb9f78bb3eaaaec245c72eef2dcc8cc2b3c0ff84a4137cfaf60059b8c7b
                                                  • Instruction ID: 87eb99fb3b110898c881589e570277fbffa432cd405ba784e7c61463f54e8a50
                                                  • Opcode Fuzzy Hash: 0e3b6bb9f78bb3eaaaec245c72eef2dcc8cc2b3c0ff84a4137cfaf60059b8c7b
                                                  • Instruction Fuzzy Hash: 7841BAB0D052089FDB50CFA9C984BAEFBF1EB09304F20906AE515BB260CB74A949CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Sz#5
                                                  • API String ID: 0-1233133972
                                                  • Opcode ID: 48c21c2803de7ddb0253e63411aca580f46d1cf8885554a5351da4805abd3dc3
                                                  • Instruction ID: 2da62d4c750fd2359d39c05906216a2687ed4fcd8ef9b7be10e4ed3d7d0f3d36
                                                  • Opcode Fuzzy Hash: 48c21c2803de7ddb0253e63411aca580f46d1cf8885554a5351da4805abd3dc3
                                                  • Instruction Fuzzy Hash: 1E41BCB0D052089FDB10CFA9C984B9EFBF0FB09304F20906AE514BB260CB74AA49CF55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 230bbf08e161ddb1f7bb6235c997ad355bc5aa8d3259fb9049b9386bcc512372
                                                  • Instruction ID: 6a7f1334f68e0ea39526e58e76654fcca1c674bde36c3a149288a7f9354e22ad
                                                  • Opcode Fuzzy Hash: 230bbf08e161ddb1f7bb6235c997ad355bc5aa8d3259fb9049b9386bcc512372
                                                  • Instruction Fuzzy Hash: 1CA2BB74E01229CFDB64EF25D988BADBBB2EB49305F1085E9D409A73A1DB345E85CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc8b615a9810c551a58050855e0f7dbc48774cff235ff3de9fff67a6410f3066
                                                  • Instruction ID: a90b9c81c628eda414ef4e3afa19f5b454a3e85c9ab467d92b513e691cd1db67
                                                  • Opcode Fuzzy Hash: fc8b615a9810c551a58050855e0f7dbc48774cff235ff3de9fff67a6410f3066
                                                  • Instruction Fuzzy Hash: F2429174E01229CFDB54CFA9D984B9DBBB2FF48310F1181A9E909A7355D730AA85CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc247bf1034c2a5011d74c40410a2ecc5102ea543b9cee59a35d056b6f931fb0
                                                  • Instruction ID: 4427ebad0351150a27165ea382cda141ddc1dd6220a6025739369767f3f718df
                                                  • Opcode Fuzzy Hash: cc247bf1034c2a5011d74c40410a2ecc5102ea543b9cee59a35d056b6f931fb0
                                                  • Instruction Fuzzy Hash: 6D61B475E01218CFEB18CF9AD994B9EBBB2BF88300F14C1A9E909A7354DB319945CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 975305d4b0798cc0d5f741e31be5d4afafa52b0cc3b32993641a9f75f535dd16
                                                  • Instruction ID: 5d407a465c7c5d271455fb330d06e8819372889fbc8220ba652df6bbdb4609da
                                                  • Opcode Fuzzy Hash: 975305d4b0798cc0d5f741e31be5d4afafa52b0cc3b32993641a9f75f535dd16
                                                  • Instruction Fuzzy Hash: C8317EB4D01208EFDB54CFA9D584AADBBF1FB49310F249169E814B7360D7349985CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12411f3f3050fe6f0bd74c2ee751320dc080f678615f3ec655e9e2415063ad95
                                                  • Instruction ID: d3778ff649f71cad84db7a8ee497fc080ec9c5aa5e4011cd1f689963ddc29bcd
                                                  • Opcode Fuzzy Hash: 12411f3f3050fe6f0bd74c2ee751320dc080f678615f3ec655e9e2415063ad95
                                                  • Instruction Fuzzy Hash: 72317DB4D01208EFDB54CFA9D484AADBBF1BB49310F249169E814B7360D3349945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b773796da9c57793a6eb69f4cb70837384769b4d78debd96887227fb7c62bde5
                                                  • Instruction ID: 2132eb9a699b3a440499bb536e4a3e4c1f2e398aa4ee2cc4c5d970d867895946
                                                  • Opcode Fuzzy Hash: b773796da9c57793a6eb69f4cb70837384769b4d78debd96887227fb7c62bde5
                                                  • Instruction Fuzzy Hash: 00218374D00208EFDB44CFAAD4856EEBBF1AB49314F10E169E814B7290D7749685CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 784804020b437d6d9bf62524381bd92a2a7c176c6137b4acb5ed5acd5cb39eca
                                                  • Instruction ID: c01bec09eda7a6611fc436ef2810d3bca0ba311841cb4850b7db190ba3afcbea
                                                  • Opcode Fuzzy Hash: 784804020b437d6d9bf62524381bd92a2a7c176c6137b4acb5ed5acd5cb39eca
                                                  • Instruction Fuzzy Hash: D3219274D00208DFDB04CFAAD4846EEBBF2AB49310F10E169E814B7390D7749A85CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(00000000,?,?,?), ref: 02BF6D6F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: Sz#5
                                                  • API String ID: 544645111-1233133972
                                                  • Opcode ID: d27110d9124101b563aa86cda5c2fd6f8d3a269d3aec88de8d79ec8f7a3ce573
                                                  • Instruction ID: fe8514018705b682ede13dc98d85138396f03a5f230dbb132ec47a63ace36ee4
                                                  • Opcode Fuzzy Hash: d27110d9124101b563aa86cda5c2fd6f8d3a269d3aec88de8d79ec8f7a3ce573
                                                  • Instruction Fuzzy Hash: 89319AB9D042589FCF10CFA9D584AEEFBB4AB19310F14906AE924B7310D774A945CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(?,?,35F68FB7,B86C8A8B), ref: 02BF2F27
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: Sz#5
                                                  • API String ID: 544645111-1233133972
                                                  • Opcode ID: c4e8d484e9fd0138b5bdb10f47a45ad35492a70fe46111c8cbe7ccd15b3d67ee
                                                  • Instruction ID: f1191667c55004babd9544ce668b3f2fb03d05082924cf125d9d892c4385f0de
                                                  • Opcode Fuzzy Hash: c4e8d484e9fd0138b5bdb10f47a45ad35492a70fe46111c8cbe7ccd15b3d67ee
                                                  • Instruction Fuzzy Hash: A43198B5D04258DFCF10CFA9E984AEEFBB1BB19310F14906AE914B7210D774A945CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(?,?,35F68FB7,B86C8A8B), ref: 02BF2F27
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: Sz#5
                                                  • API String ID: 544645111-1233133972
                                                  • Opcode ID: 55d8c9f90b73e3c7182e6a24ed202539d0bd3a226b4cba998f61b93dde314221
                                                  • Instruction ID: 43ead8872e17f744c2a6d9650c111598cf293451a765aeffea750044c444da87
                                                  • Opcode Fuzzy Hash: 55d8c9f90b73e3c7182e6a24ed202539d0bd3a226b4cba998f61b93dde314221
                                                  • Instruction Fuzzy Hash: A23199B9D04258DFCF10CFAAE984ADEFBB1BB59310F14906AE814B7210D774AA45CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(00000000,?,?,?), ref: 02BF6D6F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID: Sz#5
                                                  • API String ID: 544645111-1233133972
                                                  • Opcode ID: 923f3d491a631dc747b374d300476aff7f7311946fb80ab8dec1051c6bca8193
                                                  • Instruction ID: a5b9222e9e09f6755e4b61e1e8f9092c9bfcf5f29bd112825eaad184092cf032
                                                  • Opcode Fuzzy Hash: 923f3d491a631dc747b374d300476aff7f7311946fb80ab8dec1051c6bca8193
                                                  • Instruction Fuzzy Hash: 9C3198B9D042589FCF10CFA9E584ADEFBB0BB19314F14906AE824B7210C774AA45CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID: Sz#5
                                                  • API String ID: 4033686569-1233133972
                                                  • Opcode ID: 91081e343f22405e315857218c3f6eeea55e545437465d761afe64ddfb13f138
                                                  • Instruction ID: ce1131dc290efc69fba2d29866cec9e3e8b10e0faacb97ad2ff4e5a3e696b602
                                                  • Opcode Fuzzy Hash: 91081e343f22405e315857218c3f6eeea55e545437465d761afe64ddfb13f138
                                                  • Instruction Fuzzy Hash: DD31D8B4D05218DFCB10CFA9D984AEEFBF1AB49314F14846AE418B7320D774AA45CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID: Sz#5
                                                  • API String ID: 4033686569-1233133972
                                                  • Opcode ID: fcd7393a5c8f4b259ebea3c117d8128072b1b5f5510081f0cf6bc11e13d0992c
                                                  • Instruction ID: d082e7e2082e030cb63bf0ed2dfcdb96a5f8804c71ade8f806c4c9eed848da10
                                                  • Opcode Fuzzy Hash: fcd7393a5c8f4b259ebea3c117d8128072b1b5f5510081f0cf6bc11e13d0992c
                                                  • Instruction Fuzzy Hash: F131D8B4D05218DFCB10CFA9D984AEEFBF1AB49314F14846AE508B7310D774AA49CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 53a548220ca9288c5c2b77881349b8defb6a7b9afd1a4c01daae98b8807fb70d
                                                  • Instruction ID: 27dc07a4f35b12133e32fdd993c4fd9289112965599dc4a06e943f885905ed89
                                                  • Opcode Fuzzy Hash: 53a548220ca9288c5c2b77881349b8defb6a7b9afd1a4c01daae98b8807fb70d
                                                  • Instruction Fuzzy Hash: CAB10672704211CBDBBC2E25C44533A76ABEF84645F16C4B9DE9ACA294CF34CC8AC752
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 555e8b28bc7a4bbc512a0a2e691652707871b419e586be25e0481cfb19277e22
                                                  • Instruction ID: b8924786c8583f9c494ce5eba9ab6f0630fa39c0a554125bdaa43cc79c71a251
                                                  • Opcode Fuzzy Hash: 555e8b28bc7a4bbc512a0a2e691652707871b419e586be25e0481cfb19277e22
                                                  • Instruction Fuzzy Hash: 8FD1E731C2075A9ACB10EB64D990A9DB7B5FFD5300F508B9AD1593B224EF706AC8CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6bd134810463b44d15f660c81c2dbafb0b924d5a327ef3f2f7ced3dbc65c3b8e
                                                  • Instruction ID: e35f7e3a58c046a535e79f78ae7fba35f6d6700069b0fc42082dc9297a84f369
                                                  • Opcode Fuzzy Hash: 6bd134810463b44d15f660c81c2dbafb0b924d5a327ef3f2f7ced3dbc65c3b8e
                                                  • Instruction Fuzzy Hash: E4D1E831C2075A9ACB10EB64D990A9DB3B5FF95300F508B9AD1593B224EF706AC8CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f51b614766b1928668cb46670c58fe1a0d6cc90d7ffc68a91034fbae31e093eb
                                                  • Instruction ID: af9e78b226c5cf661bd22a94ac2d4f16ed50ee90cdf892b89cb5515dab8c4541
                                                  • Opcode Fuzzy Hash: f51b614766b1928668cb46670c58fe1a0d6cc90d7ffc68a91034fbae31e093eb
                                                  • Instruction Fuzzy Hash: F1F062B5D0520C9F8B04DFA9D5418EEFBF6AB5A310F10A16AE914B3310E73199458F68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.665296137.0000000002BF0000.00000040.00000001.sdmp, Offset: 02BF0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                  • Instruction ID: 1401774599b8c17d82e7790f9c32d64cb6ba78d8099e03d7ba523e52ac291a5a
                                                  • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                  • Instruction Fuzzy Hash: FEF042B5D0520C9F8F04DFA9D5418EEFBF2AB5A310F14A16AE914B3310E7359951CFA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Executed Functions

                                                  APIs
                                                  • VirtualProtect.KERNEL32(?,?,35F68FB7,B86C8A8B), ref: 00B72F27
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917881188.0000000000B70000.00000040.00000001.sdmp, Offset: 00B70000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: bc23afea6b794bb304fcf95bc9e36ea4fe005b5504c96a2b350d28d26753ffe8
                                                  • Instruction ID: 057026dbe03ad2610b51f49ddd35c958fb201380217dd13f7a5414bbadee41a7
                                                  • Opcode Fuzzy Hash: bc23afea6b794bb304fcf95bc9e36ea4fe005b5504c96a2b350d28d26753ffe8
                                                  • Instruction Fuzzy Hash: 513189B5D04258DFCF10CFA9E984ADEFBF1AB19310F14906AE818B7210D775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(?,?,35F68FB7,B86C8A8B), ref: 00B72F27
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917881188.0000000000B70000.00000040.00000001.sdmp, Offset: 00B70000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 49cc325e733de11c28110bce5105de460de56c5e8726cec55413ea0517055e1a
                                                  • Instruction ID: 1dada2666a434e904d81c3e29e6095d307e194ab19abdb1adbd893f197cbd064
                                                  • Opcode Fuzzy Hash: 49cc325e733de11c28110bce5105de460de56c5e8726cec55413ea0517055e1a
                                                  • Instruction Fuzzy Hash: 7E31A8B5D04258DFCF10CFA9E984AEEFBF0AB09310F14906AE828B7210D774A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(00000000,?,?,?), ref: 00B76D6F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917881188.0000000000B70000.00000040.00000001.sdmp, Offset: 00B70000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 32649b5bfd0735cb833aac6bed76c5b642c64bca4479f39393bf050c9c58baf7
                                                  • Instruction ID: fc28509e15fd36756486e33857259d3e4f042d47941c8ab4e7011ed1d992ea77
                                                  • Opcode Fuzzy Hash: 32649b5bfd0735cb833aac6bed76c5b642c64bca4479f39393bf050c9c58baf7
                                                  • Instruction Fuzzy Hash: F0317AB5D042589FCF10CFA9D984AEEFBF0AB19314F14906AE828B7310D775A945CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNEL32(00000000,?,?,?), ref: 00B76D6F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917881188.0000000000B70000.00000040.00000001.sdmp, Offset: 00B70000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 61d3d46fa9be25aeb1881e2a847cb85076a06a4400f74405fcc961fb21a29c6b
                                                  • Instruction ID: 77faeb9882245b206116767df2080b8840b403807272164e356e2f5650e24188
                                                  • Opcode Fuzzy Hash: 61d3d46fa9be25aeb1881e2a847cb85076a06a4400f74405fcc961fb21a29c6b
                                                  • Instruction Fuzzy Hash: 40319AB5D042589FCF14CFA9D884ADEFBF0AB19310F14906AE828B7210D775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917881188.0000000000B70000.00000040.00000001.sdmp, Offset: 00B70000, based on PE: false
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: b18c27e3bc4ce962581e3019f1f0480e68774e8e1fe3c349b2912bb1c81a3c29
                                                  • Instruction ID: 59492c8b527f2a866ae907501ba9f1b60338f0503ef095e6d1f6647a40a253a2
                                                  • Opcode Fuzzy Hash: b18c27e3bc4ce962581e3019f1f0480e68774e8e1fe3c349b2912bb1c81a3c29
                                                  • Instruction Fuzzy Hash: FD31D9B4D05218DFCB10CFA9D988AEEFBF1AB49314F14846AE418B7350D774AA45CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917881188.0000000000B70000.00000040.00000001.sdmp, Offset: 00B70000, based on PE: false
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 87215251200059b60d742672c7ff02d541c729cc75df610c221b58da9737a164
                                                  • Instruction ID: 7d703d94bb9b6c556123de35c649050db937b52f30cf180fee4587efa817c781
                                                  • Opcode Fuzzy Hash: 87215251200059b60d742672c7ff02d541c729cc75df610c221b58da9737a164
                                                  • Instruction Fuzzy Hash: CE31DBB4D05218DFCB10CFA9D884AEEFBF1AB49314F14806AE418B7310D774AA46CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917765964.000000000090D000.00000040.00000001.sdmp, Offset: 0090D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b67a9aaa67d7933b994b360b48d154836e33ed467312a0a1e211b02fb34e3725
                                                  • Instruction ID: 236f2268d9b72e145d512f352a21904299f27fc0c088a2e3ae4393d303697ecf
                                                  • Opcode Fuzzy Hash: b67a9aaa67d7933b994b360b48d154836e33ed467312a0a1e211b02fb34e3725
                                                  • Instruction Fuzzy Hash: C9012B7180E354AEDB108E5ADC80766BBDCEF55734F18C559ED144B2C6C378D844D6B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.917765964.000000000090D000.00000040.00000001.sdmp, Offset: 0090D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 13284c766d05496f4e0a9a8b215cf6fbb432ae570d5cf56ea775be1db92cae4d
                                                  • Instruction ID: 5d50bbfcf26cf7fa9e3846c4e9b328877667df16e76834df750df34fbf007f97
                                                  • Opcode Fuzzy Hash: 13284c766d05496f4e0a9a8b215cf6fbb432ae570d5cf56ea775be1db92cae4d
                                                  • Instruction Fuzzy Hash: 46F06272409294AFEB208E5ACC84B62FB9CEB51734F18C55AED185B286C379DC44CAB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Executed Functions

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 0501B730
                                                  • GetCurrentThread.KERNEL32 ref: 0501B76D
                                                  • GetCurrentProcess.KERNEL32 ref: 0501B7AA
                                                  • GetCurrentThreadId.KERNEL32 ref: 0501B803
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: c9438005fef2eb839f500b0c951eacef01e1880a2d655062b8b6641dbdc08e82
                                                  • Instruction ID: 5e8c66c9655e76d89c849362bde3f26934772632e6d23d4b6841bcb1bdffc2e5
                                                  • Opcode Fuzzy Hash: c9438005fef2eb839f500b0c951eacef01e1880a2d655062b8b6641dbdc08e82
                                                  • Instruction Fuzzy Hash: 545166B49042498FDB10CFAAE988BDEBBF5FF48304F208419E419A7350DB385945CFA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 0501B730
                                                  • GetCurrentThread.KERNEL32 ref: 0501B76D
                                                  • GetCurrentProcess.KERNEL32 ref: 0501B7AA
                                                  • GetCurrentThreadId.KERNEL32 ref: 0501B803
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 118532abe10db68834ecd3267bff909e54fd50a3d2e506757f22aa6d482ffe2c
                                                  • Instruction ID: b452fe65871984c3a6b39b414c0039f525234520cc5acfa3f946084e83dc2c4b
                                                  • Opcode Fuzzy Hash: 118532abe10db68834ecd3267bff909e54fd50a3d2e506757f22aa6d482ffe2c
                                                  • Instruction Fuzzy Hash: D65156B4A042498FDB10CFAAD588BDEBBF5BF48304F208459E419A7350DB785845CF66
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0501962E
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 681ecab0272aa5ff96e139b5f488d3fe16c2071261e114d6e12b385cd741964d
                                                  • Instruction ID: df03dc54f6f1cee626dcd7fafc8532d7238af5f92e47e60ee5297f50d7b4b81d
                                                  • Opcode Fuzzy Hash: 681ecab0272aa5ff96e139b5f488d3fe16c2071261e114d6e12b385cd741964d
                                                  • Instruction Fuzzy Hash: 0F713770A00B058FD764DF6AE454B5ABBF2FF88204F00892DD84AD7B50D775E845CB96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0501FD0A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: dd2ff47c7184f8b832218a7c688137d501594160e0dbb53e6b1cc437555ba3f2
                                                  • Instruction ID: 516c8dd3b6237c1f7b442ab0891a63d2f59c36ed57b5de87ba4afce07b3f8b45
                                                  • Opcode Fuzzy Hash: dd2ff47c7184f8b832218a7c688137d501594160e0dbb53e6b1cc437555ba3f2
                                                  • Instruction Fuzzy Hash: 6A5111B1C04249EFDF11CFA9D980ADDBFB2BF49314F14816AE808AB221D7359945CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0501FD0A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: f5aa2eb80410d17ef728ea21a19db459500392b036f0678a35864f6e42333bc4
                                                  • Instruction ID: e912ed936f8e72388f96e94aba6d96a2ee73dde2177a01b455c8039dea33ce9e
                                                  • Opcode Fuzzy Hash: f5aa2eb80410d17ef728ea21a19db459500392b036f0678a35864f6e42333bc4
                                                  • Instruction Fuzzy Hash: 8F5111B1D04309AFDB14CFA9D985ADEBBF1FF48314F24812AE815AB210D774A945CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0501FD0A
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 0f847e489892e1ff72d7d2639e8907e1adc55b2bd0725deeef933a5c734a4220
                                                  • Instruction ID: b1166310eaf0e4d0c99857e4af99ef72abc64f7f4058f9811ac59ccb7bd17e07
                                                  • Opcode Fuzzy Hash: 0f847e489892e1ff72d7d2639e8907e1adc55b2bd0725deeef933a5c734a4220
                                                  • Instruction Fuzzy Hash: 2E41D0B1D003099FDB14CFAAD884ADEBBF5BF48314F24812AE819AB210D774A845CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0501BD87
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 8a008fc0a82270a2b49d9a01ad13284a628d1be54462c5d2a75dd24e5e8c2434
                                                  • Instruction ID: 3ee82b2ac0255d79ba2860b52ac3fd2e7c604d24663a939e4ff1ac8255451ee1
                                                  • Opcode Fuzzy Hash: 8a008fc0a82270a2b49d9a01ad13284a628d1be54462c5d2a75dd24e5e8c2434
                                                  • Instruction Fuzzy Hash: 0121E4B5900249AFDB10CFAAD884ADEBFF4FB48324F14841AE954A3310D378A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0501BD87
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 5dd0ff109e99654ad91e8e3b380c2c5a5793427572d1b028ba1a8d30ebf68343
                                                  • Instruction ID: 4838bef8543df7bd076dfdd634c92739ede94c5fb58b71b24e3e8e2dc89efe7a
                                                  • Opcode Fuzzy Hash: 5dd0ff109e99654ad91e8e3b380c2c5a5793427572d1b028ba1a8d30ebf68343
                                                  • Instruction Fuzzy Hash: A521D5B5900249DFDB10CF9AD984ADEBBF4FB48324F14841AE914A7350D378A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,050196A9,00000800,00000000,00000000), ref: 050198BA
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 5f25c9af2ec8f4a432fc01b8de29b0ebab70e7bc4bc3c6e6569de1cb11d32d5f
                                                  • Instruction ID: d4b07c65dcc8d6babaf8b33b8d142e239aa2fd283246ec457e07c043c4f2f9d7
                                                  • Opcode Fuzzy Hash: 5f25c9af2ec8f4a432fc01b8de29b0ebab70e7bc4bc3c6e6569de1cb11d32d5f
                                                  • Instruction Fuzzy Hash: 9D1103B6D042099FDB10CF9AD444BDEBBF4EB88324F04842ED815A7600C778A945CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,050196A9,00000800,00000000,00000000), ref: 050198BA
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 87b211f6801ac035303a5a0514d7202da09bde445fe286e5498a952986ba56fe
                                                  • Instruction ID: 6673d67c4841ce6c3a3e76db33692f04d811e338826fca38a4a2276ee7fbd4ed
                                                  • Opcode Fuzzy Hash: 87b211f6801ac035303a5a0514d7202da09bde445fe286e5498a952986ba56fe
                                                  • Instruction Fuzzy Hash: 1311E2B6D042099FDB10CF9AD844BEEFBF4EB88324F14842AE815A7700C778A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0501962E
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 828a77f3c267445a5a2ab8536e8723303bd937b7f08bc002bb80a63c3367619e
                                                  • Instruction ID: b492d02231d0cee13a572d7f04018522f538eaa411f5d87e93dbd44127e63ef1
                                                  • Opcode Fuzzy Hash: 828a77f3c267445a5a2ab8536e8723303bd937b7f08bc002bb80a63c3367619e
                                                  • Instruction Fuzzy Hash: F211E0B6D046498FDB10CF9AD444BDEFBF4AB88224F14882AD819A7600D378A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowLongW.USER32(?,?,?), ref: 0501FE9D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID:
                                                  • API String ID: 1378638983-0
                                                  • Opcode ID: 1ba7d3591e634ca5af268e70cc36b3b60d791aa78e26992b2950997f89666108
                                                  • Instruction ID: 2d5816c82897e4c1c87dc1b9c4eaa5e6f3c5ab3acf4967d037977a429f8fa4a6
                                                  • Opcode Fuzzy Hash: 1ba7d3591e634ca5af268e70cc36b3b60d791aa78e26992b2950997f89666108
                                                  • Instruction Fuzzy Hash: 7911F2B58002499FDB10CF9AD985BDEBBF8EB48324F10841AE815B7340C378AA44CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowLongW.USER32(?,?,?), ref: 0501FE9D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.921273389.0000000005010000.00000040.00000001.sdmp, Offset: 05010000, based on PE: false
                                                  Similarity
                                                  • API ID: LongWindow
                                                  • String ID:
                                                  • API String ID: 1378638983-0
                                                  • Opcode ID: 58e96d608c2e8a25fbbe53be67a9a54dc405adcaa0f2993e3b8531ffb93228f3
                                                  • Instruction ID: 98d808a9ba355fb8635a3d02a8c87691feb50655dad2b9248c6964764dd47d1b
                                                  • Opcode Fuzzy Hash: 58e96d608c2e8a25fbbe53be67a9a54dc405adcaa0f2993e3b8531ffb93228f3
                                                  • Instruction Fuzzy Hash: 6D11E2B58002499FDB10CF9AD585BDEBBF8FB48324F10841AD915A7740C378A944CFB5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.917690965.000000000112D000.00000040.00000001.sdmp, Offset: 0112D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 814a0ddcdce3c8566ccdb056c9d9bfef36bd7a879008419fe43187897300d138
                                                  • Instruction ID: 1418904c83d1bd08acb19eec875e772159e55d1b7a8f5a2272e0a600abb4c317
                                                  • Opcode Fuzzy Hash: 814a0ddcdce3c8566ccdb056c9d9bfef36bd7a879008419fe43187897300d138
                                                  • Instruction Fuzzy Hash: B621F8B1504280DFDF09DF54E8C0BA6BB65FB88324F24C569E9054BA47C336E466C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.917690965.000000000112D000.00000040.00000001.sdmp, Offset: 0112D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: faf3755293eb223cdac6316e09ee1458b5cb7d898c919ba2fe3c3c526080b695
                                                  • Instruction ID: 11213f11496c24ba30980036609972f76324928bcad88ade9ba35a81b3d4914a
                                                  • Opcode Fuzzy Hash: faf3755293eb223cdac6316e09ee1458b5cb7d898c919ba2fe3c3c526080b695
                                                  • Instruction Fuzzy Hash: 0C2128B1504240DFDF09CF94E8C0B66BF75FB88328F24C569E9054B216C376E866C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.917717146.000000000113D000.00000040.00000001.sdmp, Offset: 0113D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d544aed730b6d1e6a13fa655af68bb43f17e5253bbdd6755c66a2e2800d8291
                                                  • Instruction ID: fef7aad374ae5de9ac4243d9597a4137cf8f6954306f9f8ad607771615f59a1d
                                                  • Opcode Fuzzy Hash: 8d544aed730b6d1e6a13fa655af68bb43f17e5253bbdd6755c66a2e2800d8291
                                                  • Instruction Fuzzy Hash: 442125B1604240DFDF19CF54E8C0B26FB65FBC8B54F60C569D8094B24AC736D807CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.917717146.000000000113D000.00000040.00000001.sdmp, Offset: 0113D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7327a76ec8694e881a6c157da9c429934aa537b77b4b51984530874b376b7ffa
                                                  • Instruction ID: cfc111e2f291805577ddae2070c91b4fac5bec508a2caa415fbe5541c04ebf86
                                                  • Opcode Fuzzy Hash: 7327a76ec8694e881a6c157da9c429934aa537b77b4b51984530874b376b7ffa
                                                  • Instruction Fuzzy Hash: 3D2180754083809FCB06CF64D994B11BF71EF86214F28C5DAD8498F267C33AD85ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.917690965.000000000112D000.00000040.00000001.sdmp, Offset: 0112D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction ID: 7eeeb288514ac80f993eabf6fe85a4ab9cd8cb558d9cd6976ae25d704edddd9b
                                                  • Opcode Fuzzy Hash: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction Fuzzy Hash: 4B11DF72804280CFDF06CF44E5C4B16BF71FB84324F2482A9D8054B216C37AD466CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.917690965.000000000112D000.00000040.00000001.sdmp, Offset: 0112D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction ID: 8f7f1aef2e327a192be9bb3233e41dba892bdcb809dfafc34e19173b82d1ad3a
                                                  • Opcode Fuzzy Hash: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction Fuzzy Hash: 8B11B176404280CFDF16CF54E9C4B56BF71FB84324F24C6A9D8454BA16C33AE46ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6c7de25254d4baea44393ab29a14aecd3cf1d597396d59b62d66ceb7519804b5
                                                  • Instruction ID: 2c57980ef3656fcda39529363fadb32bcb801673ebc64eabee6289ffa30c1e4a
                                                  • Opcode Fuzzy Hash: 6c7de25254d4baea44393ab29a14aecd3cf1d597396d59b62d66ceb7519804b5
                                                  • Instruction Fuzzy Hash: C2123A317001058FDB59EB79C994AAE77E2AF88704F158468E586CB3ADDF39DC82CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c23f81e3c399f4e214206a745941737de35cf2540901b9b98a7a4825d9ea1f79
                                                  • Instruction ID: 279fa5b204a83f42bae9f8851a8f21a2355abd0f5e99fcb2f31d50a8eaa31714
                                                  • Opcode Fuzzy Hash: c23f81e3c399f4e214206a745941737de35cf2540901b9b98a7a4825d9ea1f79
                                                  • Instruction Fuzzy Hash: 65912C357002158FCB58EF68C594A6E77F2AF88304F158569E586CB3A9DF38DC82CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21f68456f62b7fe57a4cebb42c319494ddb65147b4d66e47a601fa7068b4c74a
                                                  • Instruction ID: 3f0b948150df486fd625796191a9daaa00c1c9dbad377133828d42be657fce1d
                                                  • Opcode Fuzzy Hash: 21f68456f62b7fe57a4cebb42c319494ddb65147b4d66e47a601fa7068b4c74a
                                                  • Instruction Fuzzy Hash: 48F0B472D092C89FC702EF74A8614DD3FB09F1310871549D7C044DB263D9254F06D7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bb73f9d6f95915089e011631e0663d899e62b4227590fc627057e1de0769ba56
                                                  • Instruction ID: 238cb0cc5722525ff4ed44d11525610c4ddb728902ad8acebd9d5865a8aa3bc9
                                                  • Opcode Fuzzy Hash: bb73f9d6f95915089e011631e0663d899e62b4227590fc627057e1de0769ba56
                                                  • Instruction Fuzzy Hash: 0E4169757101108FCB58AF78C45996E37E2AF8861872149A9E806CB3BADF39DC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bcad87460a41fee9f7ba6f5002c99a65bf656e05bd1874e032113fd4c6ff8b2a
                                                  • Instruction ID: a5694427472d69bc494b7d0912bd1590fcef04c680df02c1ac30850e0aabb47b
                                                  • Opcode Fuzzy Hash: bcad87460a41fee9f7ba6f5002c99a65bf656e05bd1874e032113fd4c6ff8b2a
                                                  • Instruction Fuzzy Hash: B34125757101118FCB58AF78C45996E37E2EF8861872148B9E906CB3BADF39DC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 266692489b5ceee40da3bbe3c0d56e0a59ec1102752eff400be024bf2d5af90d
                                                  • Instruction ID: d8f6c14119c45571f5037e8a79e55964890187512ac7ae7705a428f55e66f3ae
                                                  • Opcode Fuzzy Hash: 266692489b5ceee40da3bbe3c0d56e0a59ec1102752eff400be024bf2d5af90d
                                                  • Instruction Fuzzy Hash: 2D2129317042118FE7659B7CE890A6F77E8EFC8518B2448BEE189D7299CB76D8438760
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1eb5378ed6405eb5d8acb5b6ecb5966e3608b34ae4b9f26af786f6f3e55113db
                                                  • Instruction ID: b85f0a9355562ca92d9de2fb99becc7311429a2f137c4be58faf3d7cb9e77afa
                                                  • Opcode Fuzzy Hash: 1eb5378ed6405eb5d8acb5b6ecb5966e3608b34ae4b9f26af786f6f3e55113db
                                                  • Instruction Fuzzy Hash: D8110A327002158FE7549A7DE881A6B77D9EB84618B1440BEF18DC765CDF36D84683A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e1b0219e631a19bc753304ed1488bd12228d44229ce3d10bfe60bc039656f58
                                                  • Instruction ID: 958535850040c91192ef0c42cf512a0ed30d94b58875f9b0392b973d9860ca2b
                                                  • Opcode Fuzzy Hash: 1e1b0219e631a19bc753304ed1488bd12228d44229ce3d10bfe60bc039656f58
                                                  • Instruction Fuzzy Hash: 7FE0D8F764D2C41FE3020675AC83BD73FE8C64326470A80EBE1D4C3182D46C48468370
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 60500f0249ab615b3a6a6c0fe845617666cd176fbaf99238edcb14c53cd64f48
                                                  • Instruction ID: 3c1f91b007f85dcec923bdb8cdebbf2c40d19ae937cec7109f5e0f7164cc5e2d
                                                  • Opcode Fuzzy Hash: 60500f0249ab615b3a6a6c0fe845617666cd176fbaf99238edcb14c53cd64f48
                                                  • Instruction Fuzzy Hash: E3E0EC71A10109EB8B44EFB4E94299EB7F99B45208B1089A9D408D7215DA35AF009BE2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.693809312.0000000001010000.00000040.00000001.sdmp, Offset: 01010000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aa9a54b51835ccccdee5e3d728e7c6bb1b308bcec8f3baee40ffe7adca993c64
                                                  • Instruction ID: df28fa555f6a788cb45b24f0ddbcb6332a07f72d5ca664589c97f8e6d37fad88
                                                  • Opcode Fuzzy Hash: aa9a54b51835ccccdee5e3d728e7c6bb1b308bcec8f3baee40ffe7adca993c64
                                                  • Instruction Fuzzy Hash: 21D0C976B041018F8B04AFB8E8554DDB3A0FF8927972006A6E16AC76F1DB35D8558652
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Executed Functions

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02A42F27
                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917711544.0000000002A40000.00000040.00000001.sdmp, Offset: 02A40000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: aa4ad5caa17990c78ca67715323f456a5e2ec30ee54b1b8319dec8adb02614ca
                                                  • Instruction ID: 77749d726ad66fa8832d0f738c236f9463236f6be0f071a6c302a51b93777103
                                                  • Opcode Fuzzy Hash: aa4ad5caa17990c78ca67715323f456a5e2ec30ee54b1b8319dec8adb02614ca
                                                  • Instruction Fuzzy Hash: 4831A8B9D042589FCF10CFA9E984AEEFBB0AF59310F24902AE814B7210C775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02A46D6F
                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917711544.0000000002A40000.00000040.00000001.sdmp, Offset: 02A40000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 397465df34407bbf01051e2b58b6b5e42f51f490d36cc3e0f2b890a339fd285c
                                                  • Instruction ID: 1ab536a03cfc33bf332f0309988133261b9bf4feca466ba3860d2434e22ae2ff
                                                  • Opcode Fuzzy Hash: 397465df34407bbf01051e2b58b6b5e42f51f490d36cc3e0f2b890a339fd285c
                                                  • Instruction Fuzzy Hash: 6031A9B9D042589FCF10CFA9E484AEEFBB0BF59314F14902AE814B7210C775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02A42F27
                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917711544.0000000002A40000.00000040.00000001.sdmp, Offset: 02A40000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 7f7532a534d88aa954889ea1f8d904d197c37663e1d7e3ccc9fc18713ae184ed
                                                  • Instruction ID: 905ef03ecd0e83132719849058138575163d8cf06e77dbdf742f24ccf39b09b1
                                                  • Opcode Fuzzy Hash: 7f7532a534d88aa954889ea1f8d904d197c37663e1d7e3ccc9fc18713ae184ed
                                                  • Instruction Fuzzy Hash: 2F3197B9D042589FCF10CFAAE980AEEFBB0BB59310F14902AE814B7210D775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02A46D6F
                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917711544.0000000002A40000.00000040.00000001.sdmp, Offset: 02A40000, based on PE: false
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 0004739cf0d9653c557c6210ce78648ae469b80de9b27c8d1043cb79f37f064c
                                                  • Instruction ID: 8b931b7db2ae1fe5d0df07fe3e09e31a93a9f7af60ece499f49dd83d358a09c8
                                                  • Opcode Fuzzy Hash: 0004739cf0d9653c557c6210ce78648ae469b80de9b27c8d1043cb79f37f064c
                                                  • Instruction Fuzzy Hash: 0E3199B9D042589FCF10CFAAD984AEEFBB4BB59310F14902AE814B7210D774A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DeleteFileW.KERNELBASE(?), ref: 02A48FB1
                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917711544.0000000002A40000.00000040.00000001.sdmp, Offset: 02A40000, based on PE: false
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: d34635735329be85ee31e03dbf8af10fbfbe6a9d248ceb5b1a870d8af4ebaeee
                                                  • Instruction ID: a096e156c92e3cc1911a9773fabf26f940539584059a71591221acb828d6bc3c
                                                  • Opcode Fuzzy Hash: d34635735329be85ee31e03dbf8af10fbfbe6a9d248ceb5b1a870d8af4ebaeee
                                                  • Instruction Fuzzy Hash: 8631CAB4D05218DFCB10CFA9D984AEEFBF1AB49314F14806AE404B7210DB78AA45CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DeleteFileW.KERNELBASE(?), ref: 02A48FB1
                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917711544.0000000002A40000.00000040.00000001.sdmp, Offset: 02A40000, based on PE: false
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 67c1defaeb3e2b29805b505e3d82862a38e6c1b097d9e3004dddc301a076e6e9
                                                  • Instruction ID: afcbdb3841039b7e7bb939894a013aba900f8df69f60d3aaecca0a3393e01301
                                                  • Opcode Fuzzy Hash: 67c1defaeb3e2b29805b505e3d82862a38e6c1b097d9e3004dddc301a076e6e9
                                                  • Instruction Fuzzy Hash: 6331BDB4D05258DFCB10CFA9D984AEEFBF5BB49314F14816AE404B7210D778AA45CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917491733.000000000134D000.00000040.00000001.sdmp, Offset: 0134D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8af34a81f43f93aae460aec11eac16275695491922bd0467cfd0f3ecddb95f5b
                                                  • Instruction ID: ac7b085f064279c5d592dcba034b227a80f7461a06bb83abe3e6a8edf4c4a1f3
                                                  • Opcode Fuzzy Hash: 8af34a81f43f93aae460aec11eac16275695491922bd0467cfd0f3ecddb95f5b
                                                  • Instruction Fuzzy Hash: E1012671408344ABEB204EAADC84767BFDCEF6663CF08C51AEE044B646C378E844C6B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001A.00000002.917491733.000000000134D000.00000040.00000001.sdmp, Offset: 0134D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cdda9c937c29df35140e3597c497f5f513c81f06fc588d60fc720824a3f14d2b
                                                  • Instruction ID: 83a6a5ca88b660e9ceed05a18551d91ef07a63a8dae29cb5fa6af62898fa9e89
                                                  • Opcode Fuzzy Hash: cdda9c937c29df35140e3597c497f5f513c81f06fc588d60fc720824a3f14d2b
                                                  • Instruction Fuzzy Hash: A5F068714043449FEB218E56CC84766FFD8EB51738F18C55AED085B246C379A844CAB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Executed Functions

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 75f3c0806f7e10b3fe784e67abd871c0d9ec52a29c388ba8096b5ccd51a2c2a1
                                                  • Instruction ID: 3fa23477fdce9050b59a137d52ef622b4514db6207bcbf43ed7a38b022a4d38c
                                                  • Opcode Fuzzy Hash: 75f3c0806f7e10b3fe784e67abd871c0d9ec52a29c388ba8096b5ccd51a2c2a1
                                                  • Instruction Fuzzy Hash: 0F122A34B106148FC718EB79D994ABE77E2EF88304F2584A8D5069B3A5DFB5DC42CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 052cbdc9d73bc035232d1b35d091d452185a1e48e39d0d97b506f14a61796dd9
                                                  • Instruction ID: 23b4f049dc1191da4e3e6f81a8c9720a55a5215a54e4bbfe22dbcc2ddf4f5993
                                                  • Opcode Fuzzy Hash: 052cbdc9d73bc035232d1b35d091d452185a1e48e39d0d97b506f14a61796dd9
                                                  • Instruction Fuzzy Hash: 9F9128347105148FCB18EF78D494ABE77F2EF88304B2585A8E5069B3A5DB75DC42CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 62987dd77844fc471ce1b38778615549552474a4dbad9fa14285a483811c2777
                                                  • Instruction ID: 5a03c1073e68f704118b3ae4b4cdba1957aac940072276a594dd48e04d67f0df
                                                  • Opcode Fuzzy Hash: 62987dd77844fc471ce1b38778615549552474a4dbad9fa14285a483811c2777
                                                  • Instruction Fuzzy Hash: BF4135757102108FC758AF78C89996E37E2EF8861872149A8E806CB7B6DF75DC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51eaf222d5dd5a99419600021c1f469cb48784fea4d4e044f68af084a9443f33
                                                  • Instruction ID: 6644e825a7396ec1d5326d59321d57b3b64c06a0be158c0d9efc8c0bf8406b06
                                                  • Opcode Fuzzy Hash: 51eaf222d5dd5a99419600021c1f469cb48784fea4d4e044f68af084a9443f33
                                                  • Instruction Fuzzy Hash: 2F4104757102118FC758AF78C89996E37E2EF8861872148A8E806CB7B6DF75DC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a7abe53bb01f76b7122e42838fc23ee5452806b3eb0362e2a85db591a8167e5a
                                                  • Instruction ID: 40107f46161e0a56710f9377f87bdcdb6ac98428f0393389c3c16399ac7bb5cf
                                                  • Opcode Fuzzy Hash: a7abe53bb01f76b7122e42838fc23ee5452806b3eb0362e2a85db591a8167e5a
                                                  • Instruction Fuzzy Hash: B421F6367142118FE724AB7DE880ABB77D9EFC4718B2441BED00AD7251DBB1DC1287A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 672a017a6b91084febaae2a67c38870c3f47ca88d6cd3188ef1398b933ed7bec
                                                  • Instruction ID: 8ec22ff6ce8b1aa576433c76868e32bfc0ae5b386cedde2998cb578883c8bf14
                                                  • Opcode Fuzzy Hash: 672a017a6b91084febaae2a67c38870c3f47ca88d6cd3188ef1398b933ed7bec
                                                  • Instruction Fuzzy Hash: 1111DA327142118FD734AA79E881ABB73E9EB84718B1441B9D10DC7254DBB2DC0687A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bbe19f1d6efa080ce117bb5edbbc8c6e24d5f1dad46b4fa18495965584cc7fbc
                                                  • Instruction ID: 6450606795cf049c3e9502b9efacee39beeb8276f04b1510b67af55d3591e6c0
                                                  • Opcode Fuzzy Hash: bbe19f1d6efa080ce117bb5edbbc8c6e24d5f1dad46b4fa18495965584cc7fbc
                                                  • Instruction Fuzzy Hash: FDE092A761C6C41FE3120671FC15B932FE8CB53274B0D81E3D4A8C6092E41D8C05C671
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd3b527c7baa6d9fe7a96c17a74e31351a0b6180adc4cae8e1a16463faa1855b
                                                  • Instruction ID: 8d4ca451872d49eeb03412b6f1c4da0d448c60e1e2d3eb47b9e2455c1ee690b6
                                                  • Opcode Fuzzy Hash: dd3b527c7baa6d9fe7a96c17a74e31351a0b6180adc4cae8e1a16463faa1855b
                                                  • Instruction Fuzzy Hash: E0E01D71E01109EFCB44EFB4E94255E77F9DB4510871089A99404E7315DF315F1057D1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000001B.00000002.698241384.0000000000BB0000.00000040.00000001.sdmp, Offset: 00BB0000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 546516e04f0ef3398dc5fa1eb331df399ead0909ea62bc27137243441d0e6014
                                                  • Instruction ID: a6479600a75220ebf2042cee8be72dc4debd9f6120217155c472b2570eeee194
                                                  • Opcode Fuzzy Hash: 546516e04f0ef3398dc5fa1eb331df399ead0909ea62bc27137243441d0e6014
                                                  • Instruction Fuzzy Hash: 91D0C976B141018F8B04AFB8E8554EDB3A0EF8927972006E6E12AC76F1DB71D815C652
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions

                                                  Executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000020.00000002.719717240.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 94bf061dd75514a4c66c82235c5fe41e7d828955b97c5f6c3cbf676d557f72e7
                                                  • Instruction ID: 9f29619a538c9c628940247b2dd33ff3f17c5e8dd6a7fd8348fe4ccf4201cc54
                                                  • Opcode Fuzzy Hash: 94bf061dd75514a4c66c82235c5fe41e7d828955b97c5f6c3cbf676d557f72e7
                                                  • Instruction Fuzzy Hash: D9213AB1504248DFDB05CF14D8C0B76BBA6FB98324F24C5A9EA054B346C336E85AD7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000020.00000002.719717240.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d562b87c7d2637a7f2a914ebe5a0ddcf95dec2b2f940732963652d46fe76e91a
                                                  • Instruction ID: 9629f756fd73e1d8faf0fb48d3b541455b53955b62facc388478576e8dd5f7ac
                                                  • Opcode Fuzzy Hash: d562b87c7d2637a7f2a914ebe5a0ddcf95dec2b2f940732963652d46fe76e91a
                                                  • Instruction Fuzzy Hash: 0E213DB1504248DFDF05DF14D8C0B36BFA6FB98318F2485A9DA050B356C336D859D7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000020.00000002.719738691.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ab01542925c07a4469e559e6567902a959cc6f8a94362b573b238d5f05694bd
                                                  • Instruction ID: f44ec1e9abafc198c7e57b166420ad63e17f83343c8eb15cb057af37c2e246f1
                                                  • Opcode Fuzzy Hash: 5ab01542925c07a4469e559e6567902a959cc6f8a94362b573b238d5f05694bd
                                                  • Instruction Fuzzy Hash: 3E21F571608240EFDB14CF54D9C4B26BB65FB88318F24C569D80E4B286C736D847CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000020.00000002.719738691.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5caaa7b00a13bb802cb1fbc103fbfc30c838de889cab8e1375c0286070c8d244
                                                  • Instruction ID: 73380c8c0f33dc1e668590d5a00c655f3d08eaff9687eb4d15053504dd8bac98
                                                  • Opcode Fuzzy Hash: 5caaa7b00a13bb802cb1fbc103fbfc30c838de889cab8e1375c0286070c8d244
                                                  • Instruction Fuzzy Hash: F1215E755093C08FCB12CF24D994B15BF71EB46314F28C5EAD8498B6A7C33A994ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000020.00000002.719717240.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction ID: 8741e4d62eea98892e557a448f60ebec9e431906f5d19a02c93e6b0d35d38a9c
                                                  • Opcode Fuzzy Hash: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction Fuzzy Hash: 4A11D676404284CFCF12CF14D5C4B66BFB2FB94324F24C5A9D9054B616C33AD85ACB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000020.00000002.719717240.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction ID: ac2a26e8eb93303c13dd8b962344b7ed7d452be74f3639d893fdcfcb5e76c70a
                                                  • Opcode Fuzzy Hash: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                                                  • Instruction Fuzzy Hash: 7D11B176504284CFCB11CF10D5C4B26BFB2FB94324F24C6A9D9454B616C33AE85ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Non-executed Functions