Loading ...

Play interactive tourEdit tour

Analysis Report m72OvSF7e5.exe

Overview

General Information

Sample Name:m72OvSF7e5.exe
Analysis ID:357566
MD5:8c596990203f7d15651498fdba84b5f3
SHA1:bcabae5c0b3ca8e9558ad3f57c3a10e8b5ae6f74
SHA256:a98a739b9ab7b06bf2833f6ef4aa97db1b7c2441365c7104e878c8b29bf90f74
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • m72OvSF7e5.exe (PID: 6316 cmdline: 'C:\Users\user\Desktop\m72OvSF7e5.exe' MD5: 8C596990203F7D15651498FDBA84B5F3)
    • schtasks.exe (PID: 7104 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • m72OvSF7e5.exe (PID: 5808 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
      • schtasks.exe (PID: 5404 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6412 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • m72OvSF7e5.exe (PID: 6620 cmdline: C:\Users\user\Desktop\m72OvSF7e5.exe 0 MD5: 8C596990203F7D15651498FDBA84B5F3)
    • schtasks.exe (PID: 3276 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • m72OvSF7e5.exe (PID: 6096 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
  • dhcpmon.exe (PID: 4608 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 8C596990203F7D15651498FDBA84B5F3)
  • dhcpmon.exe (PID: 404 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 8C596990203F7D15651498FDBA84B5F3)
    • schtasks.exe (PID: 2144 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 6984 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
    • dhcpmon.exe (PID: 5724 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "92421eeb-c456-44c2-ab8d-5a66d7e5ab97", "Group": "Company", "Domain1": "194.5.98.202", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x4356d:$a: NanoCore
    • 0x435c6:$a: NanoCore
    • 0x43603:$a: NanoCore
    • 0x4367c:$a: NanoCore
    • 0x56d27:$a: NanoCore
    • 0x56d3c:$a: NanoCore
    • 0x56d71:$a: NanoCore
    • 0x6fceb:$a: NanoCore
    • 0x6fd00:$a: NanoCore
    • 0x6fd35:$a: NanoCore
    • 0x435cf:$b: ClientPlugin
    • 0x4360c:$b: ClientPlugin
    • 0x43f0a:$b: ClientPlugin
    • 0x43f17:$b: ClientPlugin
    • 0x56ae3:$b: ClientPlugin
    • 0x56afe:$b: ClientPlugin
    • 0x56b2e:$b: ClientPlugin
    • 0x56d45:$b: ClientPlugin
    • 0x56d7a:$b: ClientPlugin
    • 0x6faa7:$b: ClientPlugin
    • 0x6fac2:$b: ClientPlugin
    00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x2080a5:$x1: NanoCore.ClientPluginHost
    • 0x23aac5:$x1: NanoCore.ClientPluginHost
    • 0x2080e2:$x2: IClientNetworkHost
    • 0x23ab02:$x2: IClientNetworkHost
    • 0x20bc15:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x23e635:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x207e0d:$a: NanoCore
      • 0x207e1d:$a: NanoCore
      • 0x208051:$a: NanoCore
      • 0x208065:$a: NanoCore
      • 0x2080a5:$a: NanoCore
      • 0x23a82d:$a: NanoCore
      • 0x23a83d:$a: NanoCore
      • 0x23aa71:$a: NanoCore
      • 0x23aa85:$a: NanoCore
      • 0x23aac5:$a: NanoCore
      • 0x207e6c:$b: ClientPlugin
      • 0x20806e:$b: ClientPlugin
      • 0x2080ae:$b: ClientPlugin
      • 0x23a88c:$b: ClientPlugin
      • 0x23aa8e:$b: ClientPlugin
      • 0x23aace:$b: ClientPlugin
      • 0x154512:$c: ProjectData
      • 0x207f93:$c: ProjectData
      • 0x23a9b3:$c: ProjectData
      • 0x20899a:$d: DESCrypto
      • 0x23b3ba:$d: DESCrypto
      Click to see the 33 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      28.2.dhcpmon.exe.2e09660.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      28.2.dhcpmon.exe.2e09660.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      22.2.m72OvSF7e5.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      22.2.m72OvSF7e5.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      22.2.m72OvSF7e5.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 75 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\m72OvSF7e5.exe, ProcessId: 5808, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\m72OvSF7e5.exe' , ParentImage: C:\Users\user\Desktop\m72OvSF7e5.exe, ParentProcessId: 6316, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp', ProcessId: 7104

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "92421eeb-c456-44c2-ab8d-5a66d7e5ab97", "Group": "Company", "Domain1": "194.5.98.202", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 31%
        Source: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeReversingLabs: Detection: 31%
        Multi AV Scanner detection for submitted fileShow sources
        Source: m72OvSF7e5.exeReversingLabs: Detection: 31%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: m72OvSF7e5.exeJoe Sandbox ML: detected
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 28.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: m72OvSF7e5.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: m72OvSF7e5.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 194.5.98.202
        Source: global trafficTCP traffic: 192.168.2.7:49722 -> 194.5.98.202:4488
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: m72OvSF7e5.exe, 00000000.00000003.245970853.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: m72OvSF7e5.exe, 00000000.00000002.305822663.0000000003091000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.381501971.0000000003A8D000.00000004.00000001.sdmp, dhcpmon.exe, 00000013.00000002.413950929.0000000002BCD000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: m72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: m72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html4
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248728208.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com%f
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comEacl
        Source: m72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: m72OvSF7e5.exe, 00000000.00000003.248802056.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comWfu
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comaW
        Source: m72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comc
        Source: m72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comdd
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.come
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comicy
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comk
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-uC
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comose
        Source: m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comrose
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comue
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comueu
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: m72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: m72OvSF7e5.exe, 00000000.00000003.255140115.0000000005F6E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: m72OvSF7e5.exe, 00000000.00000003.254576087.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.254558630.0000000005F6E000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: m72OvSF7e5.exe, 00000000.00000003.255198714.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers0.
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: m72OvSF7e5.exe, 00000000.00000003.260543521.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersB
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: m72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersH
        Source: m72OvSF7e5.exe, 00000000.00000003.253911707.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersl
        Source: m72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comiona
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: m72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn(
        Source: m72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: m72OvSF7e5.exe, 00000000.00000003.247848656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/J
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: m72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
        Source: m72OvSF7e5.exe, 00000000.00000003.248605286.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnicro
        Source: m72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnl
        Source: m72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
        Source: m72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnradM
        Source: m72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnskQ
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: m72OvSF7e5.exe, 00000000.00000003.257585115.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: m72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: m72OvSF7e5.exe, 00000000.00000003.257160739.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.:
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.245181004.0000000005F32000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: m72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comw
        Source: m72OvSF7e5.exe, 00000000.00000003.247154026.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: m72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krom
        Source: dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comE
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comicw
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: m72OvSF7e5.exe, 00000000.00000003.255571821.0000000005F57000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
        Source: m72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de)
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: m72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dett
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn-u
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnicy
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnk
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnr-f6
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnw
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.2e09660.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.m72OvSF7e5.exe.2ed95a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_0155C1340_2_0155C134
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_0155E5780_2_0155E578
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_0155E56A0_2_0155E56A
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C560100_2_07C56010
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C51D7D0_2_07C51D7D
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C500400_2_07C50040
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C500060_2_07C50006
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_087006B00_2_087006B0
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_00C766F20_2_00C766F2
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0177C13417_2_0177C134
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0177E57817_2_0177E578
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0177E56917_2_0177E569
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_034F4D7817_2_034F4D78
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_034F4D6817_2_034F4D68
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0783601017_2_07836010
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_00DC66F217_2_00DC66F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F696E018_2_04F696E0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F657F818_2_04F657F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F657E818_2_04F657E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F6E82818_2_04F6E828
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F6E81818_2_04F6E818
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC601018_2_06CC6010
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC1D7D18_2_06CC1D7D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC004018_2_06CC0040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC000718_2_06CC0007
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_001C66F218_2_001C66F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_00A5C13419_2_00A5C134
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_00A5E56A19_2_00A5E56A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_00A5E57819_2_00A5E578
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D7601019_2_06D76010
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D7004019_2_06D70040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D7000619_2_06D70006
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D71D7D19_2_06D71D7D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_075E06B019_2_075E06B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_002766F219_2_002766F2
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156FAA022_2_0156FAA0
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156E47122_2_0156E471
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156E48022_2_0156E480
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156BBD422_2_0156BBD4
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_00AA66F222_2_00AA66F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_003966F227_2_003966F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_02C7E48028_2_02C7E480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_02C7E47128_2_02C7E471
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_02C7BBD428_2_02C7BBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_00A366F228_2_00A366F2
        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
        Source: m72OvSF7e5.exe, 00000000.00000000.241760098.0000000000D2E000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.327291621.00000000075F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.328668431.00000000082E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.329514265.00000000083D0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.329514265.00000000083D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 0000000B.00000000.300773783.00000000009BE000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394477156.0000000007870000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394419121.0000000007840000.00000002.00000001.sdmpBinary or memory string: originalfilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394419121.0000000007840000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.395073982.0000000007FE0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.374304037.0000000000E7E000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394754184.0000000007980000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.391225319.0000000000B5E000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exeBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.2e09660.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.2e09660.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.m72OvSF7e5.exe.2ed95a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.2ed95a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: m72OvSF7e5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: xWdTBYiTWyTud.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.11.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@27/12@0/1
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6112:120:WilError_01
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\gztXuihPvFgNHOAEWZySf
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6548:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5408:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7144:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4696:120:WilError_01
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{92421eeb-c456-44c2-ab8d-5a66d7e5ab97}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Users\user\AppData\Local\Temp\tmp79E0.tmpJump to behavior
        Source: m72OvSF7e5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: m72OvSF7e5.exeReversingLabs: Detection: 31%
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile read: C:\Users\user\Desktop\m72OvSF7e5.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe 'C:\Users\user\Desktop\m72OvSF7e5.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe C:\Users\user\Desktop\m72OvSF7e5.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: m72OvSF7e5.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: m72OvSF7e5.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: m72OvSF7e5.exe, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: xWdTBYiTWyTud.exe.0.dr, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.m72OvSF7e5.exe.c70000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.m72OvSF7e5.exe.c70000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.11.dr, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.m72OvSF7e5.exe.900000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 17.2.m72OvSF7e5.exe.dc0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 17.0.m72OvSF7e5.exe.dc0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 18.0.dhcpmon.exe.1c0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 18.2.dhcpmon.exe.1c0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.dhcpmon.exe.270000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.dhcpmon.exe.270000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.2.m72OvSF7e5.exe.aa0000.1.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.0.m72OvSF7e5.exe.aa0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C554C0 push eax; ret 0_2_07C554C1
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_087054BD push FFFFFF8Bh; iretd 0_2_087054BF
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_078354C0 push eax; ret 17_2_078354C1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC6E8F push es; retf 18_2_06CC6E94
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5775 push es; retf 18_2_06CC581C
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5F18 pushfd ; ret 18_2_06CC5F25
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC54C0 push eax; ret 18_2_06CC54C1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC55C5 push es; ret 18_2_06CC5668
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC555B push es; ret 18_2_06CC5668
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5A67 push es; iretd 18_2_06CC5AF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5941 push es; iretd 18_2_06CC5AF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75775 push es; retf 19_2_06D7581C
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D754C0 push eax; ret 19_2_06D754C1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D755C5 push es; ret 19_2_06D75668
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D7555B push es; ret 19_2_06D75668
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D76E8E push es; retf 19_2_06D76E94
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75F18 pushfd ; ret 19_2_06D75F25
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75A66 push es; iretd 19_2_06D75AF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75941 push es; iretd 19_2_06D75AF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_075E54B5 push FFFFFF8Bh; iretd 19_2_075E54B7
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_075E53BB push dword ptr [ebx+ebp-75h]; iretd 19_2_075E53C5
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94577186354
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94577186354
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94577186354
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeJump to dropped file
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile opened: C:\Users\user\Desktop\m72OvSF7e5.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeWindow / User API: threadDelayed 4789Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeWindow / User API: threadDelayed 4641Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeWindow / User API: foregroundWindowGot 581Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6352Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6052Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6644Thread sleep time: -13835058055282155s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 2160Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6680Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2868Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6280Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5308Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMemory written: C:\Users\user\Desktop\m72OvSF7e5.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMemory written: C:\Users\user\Desktop\m72OvSF7e5.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: dhcpmon.exe, 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection111Masquerading2Input Capture11Security Software Discovery11Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 357566 Sample: m72OvSF7e5.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Multi AV Scanner detection for dropped file 2->67 69 10 other signatures 2->69 8 m72OvSF7e5.exe 6 2->8         started        12 dhcpmon.exe 4 2->12         started        14 m72OvSF7e5.exe 4 2->14         started        16 dhcpmon.exe 3 2->16         started        process3 file4 55 C:\Users\user\AppData\...\xWdTBYiTWyTud.exe, PE32 8->55 dropped 57 C:\Users\user\AppData\Local\...\tmp79E0.tmp, XML 8->57 dropped 59 C:\Users\user\AppData\...\m72OvSF7e5.exe.log, ASCII 8->59 dropped 73 Injects a PE file into a foreign processes 8->73 18 m72OvSF7e5.exe 1 12 8->18         started        23 schtasks.exe 1 8->23         started        25 schtasks.exe 12->25         started        27 dhcpmon.exe 12->27         started        29 dhcpmon.exe 12->29         started        31 schtasks.exe 14->31         started        33 m72OvSF7e5.exe 14->33         started        signatures5 process6 dnsIp7 61 194.5.98.202, 4488, 49722, 49725 DANILENKODE Netherlands 18->61 49 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->49 dropped 51 C:\Users\user\AppData\Roaming\...\run.dat, data 18->51 dropped 53 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->53 dropped 71 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->71 35 schtasks.exe 1 18->35         started        37 schtasks.exe 1 18->37         started        39 conhost.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 31->43         started        file8 signatures9 process10 process11 45 conhost.exe 35->45         started        47 conhost.exe 37->47         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        m72OvSF7e5.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        m72OvSF7e5.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        22.2.m72OvSF7e5.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.urwpp.dett0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.zhongyicts.com.cnr-f60%Avira URL Cloudsafe
        http://www.founder.com.cn/cnskQ0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnicro0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.sandoll.co.krom0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnradM0%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.tiro.comE0%Avira URL Cloudsafe
        http://www.sakkal.comw0%Avira URL Cloudsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cnht0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%Avira URL Cloudsafe
        http://www.carterandcone.comaW0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.tiro.comicw0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.carterandcone.comue0%Avira URL Cloudsafe
        http://www.ascendercorp.com/typedesigners.html40%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.urwpp.de)0%Avira URL Cloudsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.carterandcone.comicy0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.zhongyicts.com.cn-u0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnicy0%Avira URL Cloudsafe
        http://www.carterandcone.come0%URL Reputationsafe
        http://www.carterandcone.come0%URL Reputationsafe
        http://www.carterandcone.come0%URL Reputationsafe
        http://www.carterandcone.comc0%URL Reputationsafe
        http://www.carterandcone.comc0%URL Reputationsafe
        http://www.carterandcone.comc0%URL Reputationsafe
        http://www.carterandcone.comrose0%Avira URL Cloudsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.zhongyicts.com.cnw0%Avira URL Cloudsafe
        http://www.carterandcone.comose0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/J0%Avira URL Cloudsafe
        http://www.carterandcone.comdd0%Avira URL Cloudsafe
        http://www.carterandcone.comn-uC0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.comk0%URL Reputationsafe
        http://www.carterandcone.comk0%URL Reputationsafe
        http://www.carterandcone.comk0%URL Reputationsafe
        http://www.zhongyicts.com.cnk0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        194.5.98.202true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersHm72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpfalse
          high
          http://www.urwpp.dettm72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designersGm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnr-f6m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers?m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersBm72OvSF7e5.exe, 00000000.00000003.260543521.0000000005F4B000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cnskQm72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cnicrom72OvSF7e5.exe, 00000000.00000003.248605286.0000000005F4B000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.comdhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersdhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                    high
                    http://www.sandoll.co.kromm72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnradMm72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers0.m72OvSF7e5.exe, 00000000.00000003.255198714.0000000005F4B000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krm72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248728208.0000000005F4B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comEm72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.comwm72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comionam72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.245181004.0000000005F32000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnhtm72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.typography.netDm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnnm72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comaWm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmm72OvSF7e5.exe, 00000000.00000003.257585115.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comm72OvSF7e5.exe, 00000000.00000003.245970853.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comicwm72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designerslm72OvSF7e5.exe, 00000000.00000003.253911707.0000000005F4B000.00000004.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cnlm72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comuem72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ascendercorp.com/typedesigners.html4m72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.de)m72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.ascendercorp.com/typedesigners.htmlm72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comicym72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          high
                          http://www.sandoll.co.krm72OvSF7e5.exe, 00000000.00000003.247154026.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleasem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.dem72OvSF7e5.exe, 00000000.00000003.255571821.0000000005F57000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namem72OvSF7e5.exe, 00000000.00000002.305822663.0000000003091000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.381501971.0000000003A8D000.00000004.00000001.sdmp, dhcpmon.exe, 00000013.00000002.413950929.0000000002BCD000.00000004.00000001.sdmpfalse
                            high
                            http://www.carterandcone.como.m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn-um72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                high
                                http://www.zhongyicts.com.cnicym72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comem72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comcm72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comrosem72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comTCm72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnwm72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comosem72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/Jm72OvSF7e5.exe, 00000000.00000003.247848656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comddm72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comn-uCm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comlm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comkm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnkm72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/m72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlm72OvSF7e5.exe, 00000000.00000003.254576087.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.254558630.0000000005F6E000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/cabarga.htmlm72OvSF7e5.exe, 00000000.00000003.255140115.0000000005F6E000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comEaclm72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers8m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.carterandcone.comWfum72OvSF7e5.exe, 00000000.00000003.248802056.0000000005F4B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comueum72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.com%fm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        http://www.fontbureau.com/designers/m72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn(m72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.monotype.:m72OvSF7e5.exe, 00000000.00000003.257160739.0000000005F4B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          194.5.98.202
                                          unknownNetherlands
                                          208476DANILENKODEtrue

                                          General Information

                                          Joe Sandbox Version:31.0.0 Emerald
                                          Analysis ID:357566
                                          Start date:24.02.2021
                                          Start time:18:38:56
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 13m 52s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:m72OvSF7e5.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:39
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@27/12@0/1
                                          EGA Information:Failed
                                          HDC Information:
                                          • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                          • Quality average: 71.2%
                                          • Quality standard deviation: 36.9%
                                          HCA Information:
                                          • Successful, ratio: 91%
                                          • Number of executed functions: 133
                                          • Number of non-executed functions: 6
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/357566/sample/m72OvSF7e5.exe

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          18:40:03API Interceptor697x Sleep call for process: m72OvSF7e5.exe modified
                                          18:40:27Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\m72OvSF7e5.exe" s>$(Arg0)
                                          18:40:27AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          18:40:31Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                          18:40:36API Interceptor3x Sleep call for process: dhcpmon.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          194.5.98.202V33QokMrIv.exeGet hashmaliciousBrowse
                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse

                                              Domains

                                              No context

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              DANILENKODEneue bestellung.PDF.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              Eingang.Jpg.exeGet hashmaliciousBrowse
                                              • 194.5.97.116
                                              V33QokMrIv.exeGet hashmaliciousBrowse
                                              • 194.5.98.202
                                              3Fv4j323nj.exeGet hashmaliciousBrowse
                                              • 194.5.98.182
                                              scan09e8902093922023ce.exeGet hashmaliciousBrowse
                                              • 194.5.98.46
                                              PO AAN2102002-V020.docGet hashmaliciousBrowse
                                              • 194.5.98.182
                                              DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                              • 194.5.98.202
                                              neue bestellung.PDF.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              Orderoffer.exeGet hashmaliciousBrowse
                                              • 194.5.98.66
                                              neue bestellung.PDF.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              OrderSuppliesQuote0817916.exeGet hashmaliciousBrowse
                                              • 194.5.97.248
                                              DHL_6368638172 documento de recibo,pdf.exeGet hashmaliciousBrowse
                                              • 194.5.97.244
                                              QuotationInvoices.exeGet hashmaliciousBrowse
                                              • 194.5.97.248
                                              PAYMENT_.EXEGet hashmaliciousBrowse
                                              • 194.5.98.211
                                              payment.exeGet hashmaliciousBrowse
                                              • 194.5.98.66
                                              RFQ_1101983736366355 1101938377388.exeGet hashmaliciousBrowse
                                              • 194.5.98.21
                                              Slip copy .xls.exeGet hashmaliciousBrowse
                                              • 194.5.97.116
                                              Scan0059.pdf.exeGet hashmaliciousBrowse
                                              • 194.5.97.34
                                              DHL AWB # 6008824216.png.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              Scan0019.exeGet hashmaliciousBrowse
                                              • 194.5.97.34

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse

                                                  Created / dropped Files

                                                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):766976
                                                  Entropy (8bit):7.940274777998683
                                                  Encrypted:false
                                                  SSDEEP:12288:sEoF4lSePJI+f8Y+6I7MoPrYeAZDGfQ0lSzujpMEOoeYw3LLUEMthvoPTG16KL:GYPJnf876I7KTZDYizutM3oeLCsG16KL
                                                  MD5:8C596990203F7D15651498FDBA84B5F3
                                                  SHA1:BCABAE5C0B3CA8E9558AD3F57C3A10E8B5AE6F74
                                                  SHA-256:A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
                                                  SHA-512:1CBC6440FE45B66E5A72A41312B1195E25B64EDE5F97BFDE98CD9FDCABE30C9434FCEED40282D2453B7B25823AAEF7CB26F4D910E1EBA6FB95FB2A83D3968D93
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 31%
                                                  Joe Sandbox View:
                                                  • Filename: DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.doc, Detection: malicious, Browse
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5`..............0.................. ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Ho..p3......4........%..........................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....r!..p~....o......t.....+..*....0..!........(....r1..p~....o......t.....+..*....0...........r5..p.+..*..0...........rA..p.+..*".(.....*^..}.....(.......(%....**...(.....*..0..;........rQ..pr...p.(...........,..(......+..s......o .....(!.....*..0..I........r...pr...p.(.......
                                                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Preview: [ZoneTransfer]....ZoneId=0
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                  Malicious:false
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\m72OvSF7e5.exe.log
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                  Malicious:true
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp
                                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1662
                                                  Entropy (8bit):5.176206395814203
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3E
                                                  MD5:0ED283E09C831888474411E9B6B1CA70
                                                  SHA1:5D3E96B7D4E39DDE90DEE567170FA04D28F5BBE7
                                                  SHA-256:1DAC39E417775EC539C9953DFB013CAEFC1B76C78D5C989E71F16F60192ECD8D
                                                  SHA-512:6F3182A1BB764DBB319165124A640083BD0CE255F32E664B905528F52106D8018E73924EB032C0EE59EF01D37EA331123F38C13281471FD1DB29CB678BB8CDAE
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                  C:\Users\user\AppData\Local\Temp\tmp79E0.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1662
                                                  Entropy (8bit):5.176206395814203
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3E
                                                  MD5:0ED283E09C831888474411E9B6B1CA70
                                                  SHA1:5D3E96B7D4E39DDE90DEE567170FA04D28F5BBE7
                                                  SHA-256:1DAC39E417775EC539C9953DFB013CAEFC1B76C78D5C989E71F16F60192ECD8D
                                                  SHA-512:6F3182A1BB764DBB319165124A640083BD0CE255F32E664B905528F52106D8018E73924EB032C0EE59EF01D37EA331123F38C13281471FD1DB29CB678BB8CDAE
                                                  Malicious:true
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                  C:\Users\user\AppData\Local\Temp\tmp84A.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1304
                                                  Entropy (8bit):5.111047452277609
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Mxtn:cbk4oL600QydbQxIYODOLedq3fj
                                                  MD5:3B021150D732CE9C1B83583CBBAB65B0
                                                  SHA1:7AB50F74F9379D2CE4F71ABE69DB6318A81E3E59
                                                  SHA-256:BFFB90288DD6A2FC0FAFEDB06DEFEDA15979230733F2FD9A77ABFD4B1AF44F8A
                                                  SHA-512:ECB490FB065A9D7C53F8B8E3735900D61CDBCD5A5229AEDC6582EBC4ED600E4D6FE8A01156CE91A27E2C9FDEA692156162D3CD3F6709657177E9EF651C3E0BAE
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                  C:\Users\user\AppData\Local\Temp\tmpE27.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1310
                                                  Entropy (8bit):5.109425792877704
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                  MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                  SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                  SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                  SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                  C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1662
                                                  Entropy (8bit):5.176206395814203
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3E
                                                  MD5:0ED283E09C831888474411E9B6B1CA70
                                                  SHA1:5D3E96B7D4E39DDE90DEE567170FA04D28F5BBE7
                                                  SHA-256:1DAC39E417775EC539C9953DFB013CAEFC1B76C78D5C989E71F16F60192ECD8D
                                                  SHA-512:6F3182A1BB764DBB319165124A640083BD0CE255F32E664B905528F52106D8018E73924EB032C0EE59EF01D37EA331123F38C13281471FD1DB29CB678BB8CDAE
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):3.0
                                                  Encrypted:false
                                                  SSDEEP:3:wlm:wM
                                                  MD5:A09BECF4F09438D33917C5B8E0D8665A
                                                  SHA1:6E189F54EFF9747C8C4294B84390CEE3FAFB27D6
                                                  SHA-256:0B2B27FDB63119E3504818C3A080F5499F69F9B67673C9E1B06365EA5A25E73E
                                                  SHA-512:1C913FD38916398CF4FD0652169E91927ABDDBCB9B2D31A9B59D0D7D22A63C9F5C204139602D4F79D3A2715242521FA2EAB9B132DA51D30485DEA861E55C08DF
                                                  Malicious:true
                                                  Preview: ....6..H
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):41
                                                  Entropy (8bit):4.345118467927183
                                                  Encrypted:false
                                                  SSDEEP:3:oN0naRRIuA:oNcSRIuA
                                                  MD5:CAA1DF014F8918E60F42746A155DABF8
                                                  SHA1:AC61D00144FE9F813FF1E5F91E2E5C738319FE73
                                                  SHA-256:C7A609BA17D183FFAABDAA9A6F28270D508CDE2A09ABD99EE1CD3E60382A3240
                                                  SHA-512:024D7F902A8D2B49B481BA11C428BD3EF9065A11397585626EA2D1D0F4C4DED093B01D1E22DCDCEFC155769BA57A78FD461E6A98E8E4FC15CF05349BFDA0B2BF
                                                  Malicious:false
                                                  Preview: C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):766976
                                                  Entropy (8bit):7.940274777998683
                                                  Encrypted:false
                                                  SSDEEP:12288:sEoF4lSePJI+f8Y+6I7MoPrYeAZDGfQ0lSzujpMEOoeYw3LLUEMthvoPTG16KL:GYPJnf876I7KTZDYizutM3oeLCsG16KL
                                                  MD5:8C596990203F7D15651498FDBA84B5F3
                                                  SHA1:BCABAE5C0B3CA8E9558AD3F57C3A10E8B5AE6F74
                                                  SHA-256:A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
                                                  SHA-512:1CBC6440FE45B66E5A72A41312B1195E25B64EDE5F97BFDE98CD9FDCABE30C9434FCEED40282D2453B7B25823AAEF7CB26F4D910E1EBA6FB95FB2A83D3968D93
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 31%
                                                  Joe Sandbox View:
                                                  • Filename: DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.doc, Detection: malicious, Browse
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5`..............0.................. ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Ho..p3......4........%..........................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....r!..p~....o......t.....+..*....0..!........(....r1..p~....o......t.....+..*....0...........r5..p.+..*..0...........rA..p.+..*".(.....*^..}.....(.......(%....**...(.....*..0..;........rQ..pr...p.(...........,..(......+..s......o .....(!.....*..0..I........r...pr...p.(.......

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.940274777998683
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:m72OvSF7e5.exe
                                                  File size:766976
                                                  MD5:8c596990203f7d15651498fdba84b5f3
                                                  SHA1:bcabae5c0b3ca8e9558ad3f57c3a10e8b5ae6f74
                                                  SHA256:a98a739b9ab7b06bf2833f6ef4aa97db1b7c2441365c7104e878c8b29bf90f74
                                                  SHA512:1cbc6440fe45b66e5a72a41312b1195e25b64ede5f97bfde98cd9fdcabe30c9434fceed40282d2453b7b25823aaef7cb26f4d910e1eba6fb95fb2a83d3968d93
                                                  SSDEEP:12288:sEoF4lSePJI+f8Y+6I7MoPrYeAZDGfQ0lSzujpMEOoeYw3LLUEMthvoPTG16KL:GYPJnf876I7KTZDYizutM3oeLCsG16KL
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5`..............0.................. ........@.. ....................... ............@................................

                                                  File Icon

                                                  Icon Hash:00828e8e8686b000

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x4bc80a
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x6035D91A [Wed Feb 24 04:42:02 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbc7b80x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x5b4.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xba8100xbaa00False0.932769591427data7.94577186354IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xbe0000x5b40x600False0.432942708333data4.21052745269IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xc00000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xbe0900x324data
                                                  RT_MANIFEST0xbe3c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2016
                                                  Assembly Version4.0.0.0
                                                  InternalNameTGk5J.exe
                                                  FileVersion4.0.0.0
                                                  CompanyName
                                                  LegalTrademarks
                                                  Comments
                                                  ProductNameITP_RMSS
                                                  ProductVersion4.0.0.0
                                                  FileDescriptionITP_RMSS
                                                  OriginalFilenameTGk5J.exe

                                                  Network Behavior

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Feb 24, 2021 18:40:31.957748890 CET497224488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:32.234703064 CET448849722194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:32.763605118 CET497224488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:33.066901922 CET448849722194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:33.654454947 CET497224488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:34.105788946 CET448849722194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:38.740267992 CET497254488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:39.021805048 CET448849725194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:39.686141014 CET497254488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:39.966897011 CET448849725194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:40.483031034 CET497254488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:40.766974926 CET448849725194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:46.861275911 CET497284488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:47.131726027 CET448849728194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:47.655553102 CET497284488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:47.930370092 CET448849728194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:48.561847925 CET497284488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:48.831370115 CET448849728194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:54.363543987 CET497294488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:54.641540051 CET448849729194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:55.187378883 CET497294488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:55.465792894 CET448849729194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:55.984328032 CET497294488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:56.256597042 CET448849729194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:00.267158985 CET497304488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:00.547666073 CET448849730194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:01.187942028 CET497304488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:01.488466978 CET448849730194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:02.136231899 CET497304488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:02.431296110 CET448849730194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:06.447145939 CET497364488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:06.725570917 CET448849736194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:07.266489029 CET497364488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:07.545663118 CET448849736194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:08.157237053 CET497364488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:08.426438093 CET448849736194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:12.549977064 CET497374488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:12.818486929 CET448849737194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:13.329555035 CET497374488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:13.609318018 CET448849737194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:14.127358913 CET497374488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:14.393717051 CET448849737194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:18.433444977 CET497384488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:18.716609955 CET448849738194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:19.221802950 CET497384488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:19.501626968 CET448849738194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:20.006016016 CET497384488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:20.287722111 CET448849738194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:24.374414921 CET497394488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:24.666488886 CET448849739194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:25.174283981 CET497394488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:25.456455946 CET448849739194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:25.971285105 CET497394488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:26.269743919 CET448849739194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:30.285620928 CET497404488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:30.551568985 CET448849740194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:31.065418959 CET497404488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:31.341623068 CET448849740194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:31.846676111 CET497404488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:32.120675087 CET448849740194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:36.130944014 CET497424488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:36.407356977 CET448849742194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:36.909609079 CET497424488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:37.216361046 CET448849742194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:37.722147942 CET497424488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:38.044959068 CET448849742194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:42.052165985 CET497434488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:42.336393118 CET448849743194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:42.847588062 CET497434488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:43.128284931 CET448849743194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:43.628968000 CET497434488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:43.920660019 CET448849743194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:47.927405119 CET497444488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:50.942068100 CET497444488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:51.221467018 CET448849744194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:51.723417044 CET497444488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:51.996634960 CET448849744194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:56.006624937 CET497504488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:56.276757002 CET448849750194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:56.786268950 CET497504488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:57.055735111 CET448849750194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:57.567692041 CET497504488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:57.841870070 CET448849750194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:01.884973049 CET497544488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:02.181546926 CET448849754194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:02.724307060 CET497544488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:03.006623030 CET448849754194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:03.521239042 CET497544488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:03.801537991 CET448849754194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:07.842608929 CET497554488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:08.130831003 CET448849755194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:08.740433931 CET497554488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:09.056885004 CET448849755194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:09.742245913 CET497554488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:10.026472092 CET448849755194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:14.089448929 CET497564488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:14.360654116 CET448849756194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:14.912879944 CET497564488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:15.185463905 CET448849756194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:15.725471973 CET497564488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:16.186892986 CET448849756194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:20.319819927 CET497574488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:20.589809895 CET448849757194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:21.226345062 CET497574488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:21.501802921 CET448849757194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:22.137662888 CET497574488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:22.409375906 CET448849757194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:26.472191095 CET497584488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:26.742460012 CET448849758194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:27.429152012 CET497584488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:27.721585989 CET448849758194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:28.341103077 CET497584488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:28.611382008 CET448849758194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:32.657751083 CET497594488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:32.946643114 CET448849759194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:33.513401031 CET497594488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:33.801980019 CET448849759194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:34.325947046 CET497594488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:34.609378099 CET448849759194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:38.720279932 CET497604488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:39.004559040 CET448849760194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:39.513901949 CET497604488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:39.865578890 CET448849760194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:40.513993979 CET497604488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:40.806732893 CET448849760194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:44.865405083 CET497614488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:45.146435976 CET448849761194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:45.842556953 CET497614488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:46.125868082 CET448849761194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:46.639492989 CET497614488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:46.930433989 CET448849761194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:50.984880924 CET497624488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:51.256604910 CET448849762194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:51.843034983 CET497624488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:52.110577106 CET448849762194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:52.639966965 CET497624488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:52.926783085 CET448849762194.5.98.202192.168.2.7

                                                  Code Manipulations

                                                  Statistics

                                                  CPU Usage

                                                  Click to jump to process

                                                  Memory Usage

                                                  Click to jump to process

                                                  High Level Behavior Distribution

                                                  Click to dive into process behavior distribution

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:18:39:53
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\m72OvSF7e5.exe'
                                                  Imagebase:0xc70000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:19
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:20
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:20
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0x900000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:25
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:25
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:26
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:27
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:28
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\Desktop\m72OvSF7e5.exe 0
                                                  Imagebase:0xdc0000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:31
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                  Imagebase:0x1c0000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 31%, ReversingLabs
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:35
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                  Imagebase:0x270000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:52
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:52
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:53
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0xaa0000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                  General

                                                  Start time:18:41:06
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:18:41:08
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:18:41:09
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:{path}
                                                  Imagebase:0x390000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:18:41:09
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0xa30000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >

                                                    Executed Functions

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ($B$D$F$F$H$I$J$J
                                                    • API String ID: 0-832423104
                                                    • Opcode ID: 9d9de16846c935144894814fe44c5822dab21d60a7ff830783beaf117a877da3
                                                    • Instruction ID: c9980adaf2c0214d0d84ef31f8eb0ed4356e0a0014ee066b756b92d288506695
                                                    • Opcode Fuzzy Hash: 9d9de16846c935144894814fe44c5822dab21d60a7ff830783beaf117a877da3
                                                    • Instruction Fuzzy Hash: A89201B0D49229CFDB64DF68C888BEDB6B5AB4A315F5081E9C00DA7295DB744EC4CF60
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9174de5b8a477418f28134335142c443edea08b42e4fe3d3cc6efc65d34d6703
                                                    • Instruction ID: cc514707f97804c5c97fe0a138ead3cb0b154050fc3e0628102ba5e52fa9eb76
                                                    • Opcode Fuzzy Hash: 9174de5b8a477418f28134335142c443edea08b42e4fe3d3cc6efc65d34d6703
                                                    • Instruction Fuzzy Hash: 65415EB0E14608DBDB08DF6AD84069EFBF3AFC9204F14C4B9C408AB255EB351A45CB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e56823bc3d6513c739233760ddcdf74379ae37e14f218586a0cb433bf0161b05
                                                    • Instruction ID: 869b64ad904adc7ac47c6b89a42bc5ecfd3c288a7548b3f80c9a71b7842f402a
                                                    • Opcode Fuzzy Hash: e56823bc3d6513c739233760ddcdf74379ae37e14f218586a0cb433bf0161b05
                                                    • Instruction Fuzzy Hash: 3E915972C093899FDB02CFA4C894ACDBFB1BF0A300F19819BE454AB262D334A955DF51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 015598D6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: ab73cc58a8dae90a267176c70a0a54d2d316fd3ecf2d1fb1ebbccf39bf47b10d
                                                    • Instruction ID: 9fa61e131876eab0d2e9e079ddb094d31c57d0c4393537e0c32c87aa232dad33
                                                    • Opcode Fuzzy Hash: ab73cc58a8dae90a267176c70a0a54d2d316fd3ecf2d1fb1ebbccf39bf47b10d
                                                    • Instruction Fuzzy Hash: 2A711570A10B05CFDB64DF69D55079ABBF1FF89208F00892AD54ADBB50DB38E849CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 087019D3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: 64527045bc6dd5edbc5122f28e4e35ee0bb86b867b8f22b6607e291bb7def29e
                                                    • Instruction ID: f0b4b1ceda58aebbf11c2fe12a0fadd33fbf7a105842f62fd4c5cbe71b66704b
                                                    • Opcode Fuzzy Hash: 64527045bc6dd5edbc5122f28e4e35ee0bb86b867b8f22b6607e291bb7def29e
                                                    • Instruction Fuzzy Hash: B85108B1D00369DFDB10CF99C880BDDBBB5BF48314F1584AAE948A7254DB709A89CF61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %
                                                    • API String ID: 0-2567322570
                                                    • Opcode ID: 387d36e37d9e03f772eb41ad88a91d0f224b1ba1f03224b71c933d14606eaf17
                                                    • Instruction ID: 92d7796a3eddf33fc2d4acbe6b45cbc36c9294e740b8e1212935d7a2bf3aa4d7
                                                    • Opcode Fuzzy Hash: 387d36e37d9e03f772eb41ad88a91d0f224b1ba1f03224b71c933d14606eaf17
                                                    • Instruction Fuzzy Hash: 0CF19DB4D19219CBDB10CFA9D8807ECBBF9BB5A310F505295C91AA7382D73689C08F59
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 087019D3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: c2fb26a1b320f8d51539b45e5290d0a0e37c90d3feca5c8dccbcaa99b3243427
                                                    • Instruction ID: 7d9c1fefe366325b66b10b54eb5beb032b9cea64fa78d93881073b29ce7ec9c1
                                                    • Opcode Fuzzy Hash: c2fb26a1b320f8d51539b45e5290d0a0e37c90d3feca5c8dccbcaa99b3243427
                                                    • Instruction Fuzzy Hash: 645107B1D00369DFDB10CF99C880BDEBBB5BF48314F5584AAE948A7250DB705A88CF61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0155FE0A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 1667be88e76b81e04a87fb1c4ad8cfcb881b24d38d4246434094cc9e4a5d41d4
                                                    • Instruction ID: f87cf674a3a68283b64b0ff3e68ca0d6b1885636101eb8a3ea9d05f7bd53fc13
                                                    • Opcode Fuzzy Hash: 1667be88e76b81e04a87fb1c4ad8cfcb881b24d38d4246434094cc9e4a5d41d4
                                                    • Instruction Fuzzy Hash: EE51BEB1D00309AFDB14CFA9C894ADEBBB5FF48714F24852AE819AB210D7749985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 01555421
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 32842ef6b1893043a7ec4aaf49aeac75517bb7c84d889a9481fd8e914532dc16
                                                    • Instruction ID: c4be70de72340f0c1f1d34dcca840d190d3b6380c57cd5c20facd12a1d86df5f
                                                    • Opcode Fuzzy Hash: 32842ef6b1893043a7ec4aaf49aeac75517bb7c84d889a9481fd8e914532dc16
                                                    • Instruction Fuzzy Hash: D94102B0D1422CCBDB24CFA9C884BDEBBF5BF49308F51806AD908AB251DB756945CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 01555421
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 45e6c069c14e1a6f240ca002ffdb8d65663cc8c25b72892e77c2ad79c924b270
                                                    • Instruction ID: d08f82d90d6c9ac2b7075d93a213d62cc087d72608345c176630ac18766f6d88
                                                    • Opcode Fuzzy Hash: 45e6c069c14e1a6f240ca002ffdb8d65663cc8c25b72892e77c2ad79c924b270
                                                    • Instruction Fuzzy Hash: A741F2B1D1422CCFDB24CFA9C884BDEBBB5BF49308F21806AD908AB251DB755945CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08701D8D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 21f2e1d3760cf97174459383c159b854730801f7b23d86b7b6c04c67a3a29bb0
                                                    • Instruction ID: cdbd64d3e8380a6a31051ff39989327c9e9512d22990e5baee94b8dafdb62aca
                                                    • Opcode Fuzzy Hash: 21f2e1d3760cf97174459383c159b854730801f7b23d86b7b6c04c67a3a29bb0
                                                    • Instruction Fuzzy Hash: CC21E3B1900259DFCB10CFAAD885BDEBBF4FB48310F50842AE958A7250D774A954CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08701D8D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: fa2d9f3ccdeb6a08b3acdbcdf1c336b3c549980b277ac5f91e99a980e37a3152
                                                    • Instruction ID: 0ff7cdb9d8c26561be0e7b04d5e75cc0be7e0c73c7c35805198a66faa11a0920
                                                    • Opcode Fuzzy Hash: fa2d9f3ccdeb6a08b3acdbcdf1c336b3c549980b277ac5f91e99a980e37a3152
                                                    • Instruction Fuzzy Hash: A321E2B1900259DFCB10CFAAD885BDEBBF4FB48310F50842AE958A7250D778A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0155B87E,?,?,?,?,?), ref: 0155B93F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: cb7ef67149fc6b7b9d92e4d5e9b37df32eb2fbfd0e402e8be2efa9761a5e0c0a
                                                    • Instruction ID: a5ec5c67a2f61d560fc6e7e7762533f373aa0f20032738a7f95f58bab36c2e52
                                                    • Opcode Fuzzy Hash: cb7ef67149fc6b7b9d92e4d5e9b37df32eb2fbfd0e402e8be2efa9761a5e0c0a
                                                    • Instruction Fuzzy Hash: 862116B59002589FDB10CFA9D484BDEBBF4FB48320F14841AE914A7310D374A940CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0155B87E,?,?,?,?,?), ref: 0155B93F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 9d05574b76bfcb53d3b309f91c1cb79885314e492742306ccbafad85e84767c3
                                                    • Instruction ID: c8a49b3bec78738540bee8a9338123d1803892c6e5602f446060f75e2552857c
                                                    • Opcode Fuzzy Hash: 9d05574b76bfcb53d3b309f91c1cb79885314e492742306ccbafad85e84767c3
                                                    • Instruction Fuzzy Hash: 462103B59002189FDB00CFA9D984BDEBBF4FB48320F14841AE954A7310D334AA40CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08701C07
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 4f76fb89e1be9e4a2e65fd19ee0ac397ec6772a88414f9f117a202933acaf86f
                                                    • Instruction ID: 684b4cdf9997e776fc2f122d3048a11c88b608cfc12ef584cdfa3b8282b21ac7
                                                    • Opcode Fuzzy Hash: 4f76fb89e1be9e4a2e65fd19ee0ac397ec6772a88414f9f117a202933acaf86f
                                                    • Instruction Fuzzy Hash: 8721D3B5901359DFCB10CF9AD884BDEBBF4FB48324F50842AE958A7250D374A544CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 08701B3F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: 7dcb76546dfb52cd587ba8dc13c564f772b874b943787350357c4fdd4ced94b6
                                                    • Instruction ID: 2e9e52752d074695625a3316b95bd48dc07f5c0833a9834b9c79660daf8e81af
                                                    • Opcode Fuzzy Hash: 7dcb76546dfb52cd587ba8dc13c564f772b874b943787350357c4fdd4ced94b6
                                                    • Instruction Fuzzy Hash: 672115B190025A9FCB00CF9AC4857DEFBF8BB48314F54812AE818A7280E774A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08701C07
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 719485d31aa08201c39c4517136e234d04dcf1cb9a72c8a0dc8348dd7cacd7a8
                                                    • Instruction ID: aeff0bc6621ca1ee47523d8f61c03367cf03d1ba9c155b33a707440561dea65f
                                                    • Opcode Fuzzy Hash: 719485d31aa08201c39c4517136e234d04dcf1cb9a72c8a0dc8348dd7cacd7a8
                                                    • Instruction Fuzzy Hash: 5621EFB1900259DFCB10CF9AD884BDEFBF4FB48320F50842AE958A7250D378A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 08701B3F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: 617e55dc2f9abf97b5ef8ad6b665ae948a40aaa53b7a0455deb8a40389c54946
                                                    • Instruction ID: b0eb2cf1a5f6b4fcebdebc35cc5850ce8bec04a5d51b94f419227dee6d37f382
                                                    • Opcode Fuzzy Hash: 617e55dc2f9abf97b5ef8ad6b665ae948a40aaa53b7a0455deb8a40389c54946
                                                    • Instruction Fuzzy Hash: 7C2106B1D006599FCB10CF9AC4857DEFBF8BB48324F54812AE418B3240D778A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01559951,00000800,00000000,00000000), ref: 01559B62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: eaea31e09d5cc4d16cb35065688d5ce1844cf67f7c09aca0668c7d125ea79def
                                                    • Instruction ID: e32721baf5ce5a856c4caa01575e7968c4777832f2458453ea51811d7af8bf10
                                                    • Opcode Fuzzy Hash: eaea31e09d5cc4d16cb35065688d5ce1844cf67f7c09aca0668c7d125ea79def
                                                    • Instruction Fuzzy Hash: A71103B6904249DFDB10CF9AD484ADEFBF4FB48324F04842AE919AB200C378A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01559951,00000800,00000000,00000000), ref: 01559B62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 0cc3eff3a40b9dea7d69dc80676eee2e130e09480d9bab74aeb59bb1d688c51a
                                                    • Instruction ID: d6b2150ce49161cb3ca94577951b6233c50510cbf34f3acdb2ca00d5cbf67363
                                                    • Opcode Fuzzy Hash: 0cc3eff3a40b9dea7d69dc80676eee2e130e09480d9bab74aeb59bb1d688c51a
                                                    • Instruction Fuzzy Hash: 1E1112B6C00249CFDB14CFA9D584BEEFBF4BB48324F04852AD919AB200C378A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08701CC3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 0b2946cf746da59ea5168530757ca3989bc562c54096d1f6571af5d3243968c3
                                                    • Instruction ID: 11204995012478cf7b9a299c1e16101f513145cabc4e7aa1fec691f43f74ddab
                                                    • Opcode Fuzzy Hash: 0b2946cf746da59ea5168530757ca3989bc562c54096d1f6571af5d3243968c3
                                                    • Instruction Fuzzy Hash: B21102B5900349DFCB20CF9AC884BDFBBF8EB48324F148419E569A7250C375A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08701CC3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: c3aea0c37102d8ce667d0060fff0f87316c4a2f850496a2a56c0eafb4d272761
                                                    • Instruction ID: fd2cb86e0d42463ef42b41573b47055bb6ca5d8492356143cb3e0e2e0dc2320e
                                                    • Opcode Fuzzy Hash: c3aea0c37102d8ce667d0060fff0f87316c4a2f850496a2a56c0eafb4d272761
                                                    • Instruction Fuzzy Hash: 2711F2B5900249DFCB10CF9AD888BDFBBF8FB48324F148419E569A7250C375A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 08702A7D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: df6921b43f4beeda133c6fc31c94bd8c73f6494045a8d410816592261f0dd258
                                                    • Instruction ID: 03a5a1b1b22227395efdc965c1f32e37c2cc9d89992fe609da335b25af0706f2
                                                    • Opcode Fuzzy Hash: df6921b43f4beeda133c6fc31c94bd8c73f6494045a8d410816592261f0dd258
                                                    • Instruction Fuzzy Hash: F111F5B58003499FDB10DF99D989BDEFBF8EB48320F20841AE954A7640C374A544CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 015598D6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 6528fdd45f00555b8f966d32f9c65fe2cd471cf9a38dcf34aaf50ef9c543d3dd
                                                    • Instruction ID: 024165c8553af7eec2b75f96b2fb192a0cab23eaa01142e9f413152cbea91db5
                                                    • Opcode Fuzzy Hash: 6528fdd45f00555b8f966d32f9c65fe2cd471cf9a38dcf34aaf50ef9c543d3dd
                                                    • Instruction Fuzzy Hash: 8F11CDB5C00649CBDB10CF9AD444ADEFBF4EB89324F14842AD969A7600C378A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0155FF28,?,?,?,?), ref: 0155FF9D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 78dd2cd325aef79cc6cccb3568211f30d561407973eb3e6a5a8c6e8f3a50f143
                                                    • Instruction ID: a2355568d59cd3788ae131ab8fcebfdee633a39bb752e0319399e0842d9fe55f
                                                    • Opcode Fuzzy Hash: 78dd2cd325aef79cc6cccb3568211f30d561407973eb3e6a5a8c6e8f3a50f143
                                                    • Instruction Fuzzy Hash: B21133B18002489FDB10CF99D588BDEFBF8FB48324F10841AE924A7740C374A940CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: 15098c0af1ea65fe6fd8fb889c17c92fd76047146e3d61bb2e23ecbd574d5ae3
                                                    • Instruction ID: 760b3cd63d9abe18cd0076747adb30619e8a18234dfae173734e6e7ce1ebbda1
                                                    • Opcode Fuzzy Hash: 15098c0af1ea65fe6fd8fb889c17c92fd76047146e3d61bb2e23ecbd574d5ae3
                                                    • Instruction Fuzzy Hash: 481100B1800299CFCB10CF9AD488BDEFBF8EB48324F20842AD558A7250C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 08702A7D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: e6b9513f70156cbcd0e5478c3cac7c1406dd0d0146e62a6939f6946bbf23fb1a
                                                    • Instruction ID: 69a49ecf6abbc4a1a00dbe474bd403547af2d5791a22c51e54f2937748483488
                                                    • Opcode Fuzzy Hash: e6b9513f70156cbcd0e5478c3cac7c1406dd0d0146e62a6939f6946bbf23fb1a
                                                    • Instruction Fuzzy Hash: 8B11D3B58003499FDB10DF99D888BDEFBF8EB48324F14845AE958A7640C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0155FF28,?,?,?,?), ref: 0155FF9D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 64830e7dccbb31967d357368d5080f838e8ce15c698ccce16139c3b98242c9b7
                                                    • Instruction ID: 0c5dd87439d1db66402f60ffda8ceee1a5079a5c3eee7a6eb9a6a6c7207d8509
                                                    • Opcode Fuzzy Hash: 64830e7dccbb31967d357368d5080f838e8ce15c698ccce16139c3b98242c9b7
                                                    • Instruction Fuzzy Hash: 161103B59002499FDB10CF99D589BDEBBF8FB48324F14881AE964B7640C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.329695876.0000000008700000.00000040.00000001.sdmp, Offset: 08700000, based on PE: false
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: d1eb40cf029f4a74120f6bc496d781dd1573af1a82e3269797a71aa5bf4df446
                                                    • Instruction ID: a42192a88354e0c6a11b09ed36720379dab5e074e0d8469699b85cdf9cfbe3be
                                                    • Opcode Fuzzy Hash: d1eb40cf029f4a74120f6bc496d781dd1573af1a82e3269797a71aa5bf4df446
                                                    • Instruction Fuzzy Hash: 9C11E2B1800259CFCB10DF9AD488BDEFBF8EB48324F14846AD559A7250C774A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %
                                                    • API String ID: 0-2567322570
                                                    • Opcode ID: 7697727a7af4ddb9f0dcae72f17035e42f209a1a55ef3e2d6a23e7718a9c5de5
                                                    • Instruction ID: 3c111c6bce9f0c2c4f8ada13bdef824c8617df06c2be602ec262e71e4ee9c945
                                                    • Opcode Fuzzy Hash: 7697727a7af4ddb9f0dcae72f17035e42f209a1a55ef3e2d6a23e7718a9c5de5
                                                    • Instruction Fuzzy Hash: 573178B8D19119CBCB24CF59D9417ECB7F8AB5A310F005295C90EA3282E7768EC08F99
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305524627.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8af5a4df94f69ef99dd80413cc382bb7e39c436e3dc2d1f39ea9bdc7f88b8e87
                                                    • Instruction ID: dd3324a0b637c898ebf286ef074b79276bb33f1b791f6ad42087ce5eb937401d
                                                    • Opcode Fuzzy Hash: 8af5a4df94f69ef99dd80413cc382bb7e39c436e3dc2d1f39ea9bdc7f88b8e87
                                                    • Instruction Fuzzy Hash: 2F2137F1904240DFDB15CF54D8C0B16BBA1FB84358F24C56EDA494B356C336D807CA61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305524627.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 512e41fc3d94db755b1b1f54f591d3142d828620c193bafdd353714f9c7bb63a
                                                    • Instruction ID: 1dc65879ff2c13cfc5708c076f64dd04fa6df082f944b79acdbf09137a9f282b
                                                    • Opcode Fuzzy Hash: 512e41fc3d94db755b1b1f54f591d3142d828620c193bafdd353714f9c7bb63a
                                                    • Instruction Fuzzy Hash: 4A2149B5904240DFDB01CF94D9C0B26BBA1FB84324F25CA7EDA494B356C336D806CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305524627.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e862e784e67f92d9e5d7aad4877c332df3307c6f09eb1566c2bbabb3111a3a96
                                                    • Instruction ID: 8ade502d1212f70770259f7631c3c4ca6da5b1701a54ddf9aa2310b9061641df
                                                    • Opcode Fuzzy Hash: e862e784e67f92d9e5d7aad4877c332df3307c6f09eb1566c2bbabb3111a3a96
                                                    • Instruction Fuzzy Hash: F321AF755093808FCB02CF24D590716BF71EB46214F28C5EBC8498B767C33A980ACB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 40479c43237b5077300292dbdc8d307141b7d357c7ea318cfb866f528b7a8a14
                                                    • Instruction ID: d531bde424e234f555c0efbedbc873ad5bab42f45ee20d02eb96d815fc8e5d78
                                                    • Opcode Fuzzy Hash: 40479c43237b5077300292dbdc8d307141b7d357c7ea318cfb866f528b7a8a14
                                                    • Instruction Fuzzy Hash: 2011A7B0B102159FCB189A768C5167E7BA6AB86650F04C239ED1EEB340EB368D8087D5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305524627.00000000014FD000.00000040.00000001.sdmp, Offset: 014FD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 918b5a484225ea750dc867420c5dc02e162b71f4ae55fd38ff69526cb1fe86f3
                                                    • Instruction ID: 1f5b6a93733686ad8294b55fb0d869c8ae186bb7180941cec7c8da58bc54a7c5
                                                    • Opcode Fuzzy Hash: 918b5a484225ea750dc867420c5dc02e162b71f4ae55fd38ff69526cb1fe86f3
                                                    • Instruction Fuzzy Hash: 40118E79904280DFDB12CF54D5C4B16BB71FB84224F24C6AED9494B766C33AD44ACB92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3fd7d97bab20b9fbd033ac577518db4d6894f0c1b941ddc360d6fe5ed24a0e0d
                                                    • Instruction ID: c7a5c22c15289087a1f348a26042d227255fab9fc0c2affa603cd189e2e36263
                                                    • Opcode Fuzzy Hash: 3fd7d97bab20b9fbd033ac577518db4d6894f0c1b941ddc360d6fe5ed24a0e0d
                                                    • Instruction Fuzzy Hash: 60110CB0E25389EFC711DF74D484A9DBFB5EB46108F4046E9D904AB291DB315D48DB41
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9c5a077c690d2ccfdd03c2e733a54dcd84856805768c85f2867e2505b66841d
                                                    • Instruction ID: cce1a768feeefda300812e1ea483e70b1a7626b4529a4254c8a9a877b935694a
                                                    • Opcode Fuzzy Hash: f9c5a077c690d2ccfdd03c2e733a54dcd84856805768c85f2867e2505b66841d
                                                    • Instruction Fuzzy Hash: E7F062B0A6120AEFCB44EFB4D584AADBBB5FB54208F504968D905A7254DF305E48DB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4634ef367a43f97605045bf4f447cd685c3e398d39a4073cfe7c3b9eab2ddd65
                                                    • Instruction ID: cbaadf4f69a197f67e6cd25cc46549dc3cd12f901ed9fcf1bce1da6d7b5428cc
                                                    • Opcode Fuzzy Hash: 4634ef367a43f97605045bf4f447cd685c3e398d39a4073cfe7c3b9eab2ddd65
                                                    • Instruction Fuzzy Hash: 88E03270E26308EFCB04DFA0E40AAADBBB8EB45300F1091A9D804A3240EB355A40DF44
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2e149c0b5b438743cbc172468738db0d676a67408ec5123689dc8ff2b72ca1d
                                                    • Instruction ID: 6b342ae0b02af0c9dd04c79a22a4482de4d7b265a73100530df13821af621be6
                                                    • Opcode Fuzzy Hash: b2e149c0b5b438743cbc172468738db0d676a67408ec5123689dc8ff2b72ca1d
                                                    • Instruction Fuzzy Hash: CCF0C970965219CFDB60DF20D854BE9BBB1FB4E320F1086A5D909A3384CB755E95CF84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Non-executed Functions

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 9
                                                    • API String ID: 0-2366072709
                                                    • Opcode ID: 3d31447b23f0272ec01119f8eed7d85a4f311a88a41be5d3927ed2acaf5759fd
                                                    • Instruction ID: 50dbfab95539fe04765aa1820ce0aa37ca08d1b6bc7a816b9f958e6e262a4004
                                                    • Opcode Fuzzy Hash: 3d31447b23f0272ec01119f8eed7d85a4f311a88a41be5d3927ed2acaf5759fd
                                                    • Instruction Fuzzy Hash: 079191B0E0462D8BDB64DF29CE4578ABBF5BF89300F4541E5D24CA6245E7319E91CF06
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9e5bdbbba3f04da22603646981772429d7304797f099de99864f38468e4a07dc
                                                    • Instruction ID: 494e2e219839cf720cae411e9cf146ff9c8663ed68c866a703aba804c6c9f610
                                                    • Opcode Fuzzy Hash: 9e5bdbbba3f04da22603646981772429d7304797f099de99864f38468e4a07dc
                                                    • Instruction Fuzzy Hash: F912B6F14117468BD330CF65E89818D3F61B7453B8B90C309D2A56BAF9D7B8164AEF84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ea8e12e0c2ea0adf9d072d53003f25b1ea0672e9bb41766db743b753a87729cf
                                                    • Instruction ID: 3e236845efdc244437003a5cf8661582a1227e0ba320c905675dbe735018f0d4
                                                    • Opcode Fuzzy Hash: ea8e12e0c2ea0adf9d072d53003f25b1ea0672e9bb41766db743b753a87729cf
                                                    • Instruction Fuzzy Hash: 12A15832E0021A8FCF55DFA9C8549DEBBB6FF85300B15856AE905BF261EB71A905CF40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.305654387.0000000001550000.00000040.00000001.sdmp, Offset: 01550000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b3a6085dcd2b3d60ee0127e7896a3b7530ffd4d47a0b1b67a8d16f8503e9cb13
                                                    • Instruction ID: 2f44ee0b0557159e889ccbab6228b642515363a65f6eddc8c38a809599f458cb
                                                    • Opcode Fuzzy Hash: b3a6085dcd2b3d60ee0127e7896a3b7530ffd4d47a0b1b67a8d16f8503e9cb13
                                                    • Instruction Fuzzy Hash: 50C117B18117468BD730CF65E88818D7F71BB853B8F50C319D1616BAE8D7B8164AEF84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ac568d29ad08066f61ed83bb8a8dbec9bedcd0eee3725b11f95a676382cb9cf
                                                    • Instruction ID: 03a7a993e12fe15c0ab17296d59573d48b6203ce59e8945d7c7313866785d2ce
                                                    • Opcode Fuzzy Hash: 9ac568d29ad08066f61ed83bb8a8dbec9bedcd0eee3725b11f95a676382cb9cf
                                                    • Instruction Fuzzy Hash: 5F51A0B1D056558BE759CF278D4068AFBF3AFC5300F19C1BAC948AB155EB3049868F15
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.328077329.0000000007C50000.00000040.00000001.sdmp, Offset: 07C50000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5564aed372dfc3fc504bd7077602bcecc9ca9d1b1aff600d4c334a9ea05c8180
                                                    • Instruction ID: 6a127f2da6d10cd55c9c8f2469e1d136f025612ddfc2f2cd2e896dabd9ccd5b4
                                                    • Opcode Fuzzy Hash: 5564aed372dfc3fc504bd7077602bcecc9ca9d1b1aff600d4c334a9ea05c8180
                                                    • Instruction Fuzzy Hash: 784151B1E056598BEB5CCF678D4068AFAF7AFC9300F14C1B9C94CAB215DB304A868F55
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Executed Functions

                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.394343232.0000000007830000.00000040.00000001.sdmp, Offset: 07830000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae1134635c3de28d476afef8b79aa56174d858b34aee6eba8eaab93475f76803
                                                    • Instruction ID: 8d018fbb77a3ab4658f337c9c98b4ff6df15bb8e1695f32ddbd79d53473041ae
                                                    • Opcode Fuzzy Hash: ae1134635c3de28d476afef8b79aa56174d858b34aee6eba8eaab93475f76803
                                                    • Instruction Fuzzy Hash: 9D411BB0E05609DBDB08DF6AD84569EFBF3BFC9204F14C5B9C408AB265EB741A49CB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 017798D6
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 5e0e52ff62a61b8d681e124645d7e7369480f3c319e39fd1d14c8823f10ddd3e
                                                    • Instruction ID: ced00e9eeb4cd3c9a3d8e188cde8a0141ca6de01bb27e0a123306d9ce3183352
                                                    • Opcode Fuzzy Hash: 5e0e52ff62a61b8d681e124645d7e7369480f3c319e39fd1d14c8823f10ddd3e
                                                    • Instruction Fuzzy Hash: FA711470A01B058FDB64DF6AD44479AFBF1FF88218F108A29D58ADBB50D734E845CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.394343232.0000000007830000.00000040.00000001.sdmp, Offset: 07830000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %
                                                    • API String ID: 0-2567322570
                                                    • Opcode ID: b20552a1b6427366eed2f8f77e8b8875cc8e60b372eda3afc9c41efc6b1221da
                                                    • Instruction ID: 9543b57af4e4cc8509dee97acb88bde092604c0effeb9a22b94244afb0d915ca
                                                    • Opcode Fuzzy Hash: b20552a1b6427366eed2f8f77e8b8875cc8e60b372eda3afc9c41efc6b1221da
                                                    • Instruction Fuzzy Hash: CEF16EF0D19219CBCB14CF6CD8847EDBBB5BB6A318F105296E519E7282D73489818FA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0177FE0A
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: c22019deaca034229f910a363ed2826069340776ecab14548ebe5ab4fe1220d0
                                                    • Instruction ID: db76353ed76f246dc4da9622e39b39d7152ac8470d4711f4c2c370b491d6b3cb
                                                    • Opcode Fuzzy Hash: c22019deaca034229f910a363ed2826069340776ecab14548ebe5ab4fe1220d0
                                                    • Instruction Fuzzy Hash: 2851FEB1C003489FDF15CFA9C980ADEBFB1BF48314F24856AE819AB211D7749885CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0177FE0A
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 74126aca98d32f35af9656283f7baa86b943d27aff07b74ff5264cd280dba339
                                                    • Instruction ID: 0f1136c21e24adf91344e4f23e52ea61e50a4ad9da01831986ee231bfa231960
                                                    • Opcode Fuzzy Hash: 74126aca98d32f35af9656283f7baa86b943d27aff07b74ff5264cd280dba339
                                                    • Instruction Fuzzy Hash: 9751B0B1D002499FDF14CFA9D984ADEFBB1FF48314F24862AE819AB210D7749985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0177FE0A
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 0a1ff9edbffc11e20a30bc980cc2abe3893881035841dbc8e0d0bb647538ee3b
                                                    • Instruction ID: 53e09dede1e6b1296faa7bda7593a6ee6634a98cd20bc39d074394f5252dd57b
                                                    • Opcode Fuzzy Hash: 0a1ff9edbffc11e20a30bc980cc2abe3893881035841dbc8e0d0bb647538ee3b
                                                    • Instruction Fuzzy Hash: BD51BEB1D003099FDF14CF99C984ADEFBB5BF48314F24852AE819AB210D7749985CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 01775421
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: b0ef0cfc04ababf94d99adeebac9d73e858ca1808a18b2418749a3eabebb5647
                                                    • Instruction ID: f5380f832822ea78e78413ac53c2b1d1f160d275a7983b8a47f76d63b1171e90
                                                    • Opcode Fuzzy Hash: b0ef0cfc04ababf94d99adeebac9d73e858ca1808a18b2418749a3eabebb5647
                                                    • Instruction Fuzzy Hash: 0241FFB1D0421CCFDB24DFA9C884B8EFBB5BF49308F21806AD419AB251DB756985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 01775421
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 27f6a58d1bc2c9978874a7499b8c6cc29e161ea87496d3c5433b2479bfd02e69
                                                    • Instruction ID: 888863eeaeff99fc1d531a0becbb9afe76f3c19e9d29626be48500e5f914d38b
                                                    • Opcode Fuzzy Hash: 27f6a58d1bc2c9978874a7499b8c6cc29e161ea87496d3c5433b2479bfd02e69
                                                    • Instruction Fuzzy Hash: 9841F1B0D0421CCBDB24DFA9C884B9EFBB5BF49308F21806AD509AB251DB756985CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 034F23D1
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.378132586.00000000034F0000.00000040.00000001.sdmp, Offset: 034F0000, based on PE: false
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: 629bacd8823fa81a46cf931fc24d59c8cc8a825aae6a7b1a5603ad3827495ed2
                                                    • Instruction ID: 5df1be2a4a61e25a27fed9923a3dd389ef198f9f1e9fddae73a6d49a708d35ad
                                                    • Opcode Fuzzy Hash: 629bacd8823fa81a46cf931fc24d59c8cc8a825aae6a7b1a5603ad3827495ed2
                                                    • Instruction Fuzzy Hash: 8C4129B8A003499FCB14CF99C488A9AFBF5FF88314F198859D519AB321D374A841CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0177B87E,?,?,?,?,?), ref: 0177B93F
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: addec4a841ebebcd9bc8b85f6fc024c8ed792df5d09dde7da38404f95b85c4ec
                                                    • Instruction ID: 9e3b21798f05c1339767ec94455328f2951616d9782b79924d6bf24205568727
                                                    • Opcode Fuzzy Hash: addec4a841ebebcd9bc8b85f6fc024c8ed792df5d09dde7da38404f95b85c4ec
                                                    • Instruction Fuzzy Hash: E721F2B5900249AFDB10CFA9D884ADEFBF8EB48320F14802AE954A7210D374A940CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0177B87E,?,?,?,?,?), ref: 0177B93F
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: b3961e9cbd0ba646d480576c99e84b31cd2c3d7f23698e8c56d6fc4fd8b86e8c
                                                    • Instruction ID: 748b1437f84641c295bc55acc40ee2cbe749d5982bf2c76c01a375053112f38c
                                                    • Opcode Fuzzy Hash: b3961e9cbd0ba646d480576c99e84b31cd2c3d7f23698e8c56d6fc4fd8b86e8c
                                                    • Instruction Fuzzy Hash: 7D21FEB5900249AFDB10CFA9D884AEEBBF4EB48324F14852AE954A3210D374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01779951,00000800,00000000,00000000), ref: 01779B62
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 680ab24e398e45d0d08d62a3fbb36a6c3c28091a51f1c9a9e393ec461cc65d6a
                                                    • Instruction ID: 062e66f7eba030a07f846056107817d4fd6a563ba985c78fa99248d69a815858
                                                    • Opcode Fuzzy Hash: 680ab24e398e45d0d08d62a3fbb36a6c3c28091a51f1c9a9e393ec461cc65d6a
                                                    • Instruction Fuzzy Hash: F21100B29002498FDF10CF9AD484BEEFBF4EB88324F04856AE955A7210C374A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01779951,00000800,00000000,00000000), ref: 01779B62
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 65bbc7d99a1f46418e10912025eb43a08d76ec2a8a93945d3a5c500cd8c1a767
                                                    • Instruction ID: 452f19101bfaf40c4f27bb9d78c9618853f91c58ae42f21505ef0a0e3b17d6cd
                                                    • Opcode Fuzzy Hash: 65bbc7d99a1f46418e10912025eb43a08d76ec2a8a93945d3a5c500cd8c1a767
                                                    • Instruction Fuzzy Hash: 712103B69002498FDB14CFAAD484BEEFBF4FB88324F14852ED555A7210C375A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 017798D6
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 10eb78d439fc7ec925d00b870a7bf9d2fd7ee74b69fa4063c086c4e23f0c531f
                                                    • Instruction ID: 2345b76c8de9d69c61a6a1e03145154a5619cb6895390f1da1e5a7f30237a5d4
                                                    • Opcode Fuzzy Hash: 10eb78d439fc7ec925d00b870a7bf9d2fd7ee74b69fa4063c086c4e23f0c531f
                                                    • Instruction Fuzzy Hash: C511E0B5D002498FDB10CF9AD444BDEFBF4EB89324F14852AD559B7600D378A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0177FF28,?,?,?,?), ref: 0177FF9D
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 0cfc698b2910c0c2bf3df7fc60e7b147d0200f3f2f32877aeebaff65edaa9934
                                                    • Instruction ID: 63cd6ddb7c6657d9d256d533074d2cf46fea2a0c38e99b271f5d6acefd063d57
                                                    • Opcode Fuzzy Hash: 0cfc698b2910c0c2bf3df7fc60e7b147d0200f3f2f32877aeebaff65edaa9934
                                                    • Instruction Fuzzy Hash: A61133B18002498FDB10DF9AD588BEEFBF8EB49324F10845AE964A7340C374A940CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0177FF28,?,?,?,?), ref: 0177FF9D
                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.377228078.0000000001770000.00000040.00000001.sdmp, Offset: 01770000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: fc82d40cd80a229ce038185ff7859892bb348a3966085bbf34741995369450b4
                                                    • Instruction ID: 30846ec60aa59acb62b84b51dba47ecc66880dcd1351662ecd5a31392a9e1f31
                                                    • Opcode Fuzzy Hash: fc82d40cd80a229ce038185ff7859892bb348a3966085bbf34741995369450b4
                                                    • Instruction Fuzzy Hash: 6A1133B5C002498FDB10CF99D584BEEFBF4EB89324F14851AE865A7740C374A940CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.394343232.0000000007830000.00000040.00000001.sdmp, Offset: 07830000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b33cb714f39761e34e1ec42507be688ec77450d94f8f36d2304de0bd54222460
                                                    • Instruction ID: 24c8f028c26f2866ff956c11badce1c38f78ebc133e4bbdfb74ae010b07b538c
                                                    • Opcode Fuzzy Hash: b33cb714f39761e34e1ec42507be688ec77450d94f8f36d2304de0bd54222460
                                                    • Instruction Fuzzy Hash: 32119470B001194BCB5C9E79D810A7E77A6ABD5664F04C129F956EB340EA358D0087D3
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.394343232.0000000007830000.00000040.00000001.sdmp, Offset: 07830000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca20c902ebbac0fa0ba9d68364535ac94edae7698f0c1bfd57ad6107e663d539
                                                    • Instruction ID: 5da996e288278630090d121a29ac04a24298f5589e2334c0e8a253859b7fbe59
                                                    • Opcode Fuzzy Hash: ca20c902ebbac0fa0ba9d68364535ac94edae7698f0c1bfd57ad6107e663d539
                                                    • Instruction Fuzzy Hash: BEF06270E5520EEFCB40EFB8E585AAD7BF5FB59209F504968D504E7214DB305E48EB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.394343232.0000000007830000.00000040.00000001.sdmp, Offset: 07830000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8f44f58b63820373b0b39da413e021f343cd01153cb080af72ae7f75199d50ce
                                                    • Instruction ID: eeb15e4f742d73dcf01cdd5a3b12ca9a881cb792e0bb976bab2997537913438e
                                                    • Opcode Fuzzy Hash: 8f44f58b63820373b0b39da413e021f343cd01153cb080af72ae7f75199d50ce
                                                    • Instruction Fuzzy Hash: F0E0C974D19308DFC704DFA4E509AADBBB4EB45305F1091A9D805A3344EB345D44DB84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000011.00000002.394343232.0000000007830000.00000040.00000001.sdmp, Offset: 07830000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 28c02fcda8ebff01a3f60fb074a654e434057a320f450b92077b544b4b32a2f4
                                                    • Instruction ID: 90010292a40da75a3734f2a839225342160cd81cf7062b6f4fb558570c509c34
                                                    • Opcode Fuzzy Hash: 28c02fcda8ebff01a3f60fb074a654e434057a320f450b92077b544b4b32a2f4
                                                    • Instruction Fuzzy Hash: 0AF0C9B0A592199BDB60CF24D8547ECBBB1FB4D324F104695D50993384DB701E95DF80
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Non-executed Functions

                                                    Executed Functions

                                                    APIs
                                                    • PostThreadMessageA.USER32(00000000,00000000,00000000,?), ref: 06CCCD43
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.386603188.0000000006CC0000.00000040.00000001.sdmp, Offset: 06CC0000, based on PE: false
                                                    Similarity
                                                    • API ID: MessagePostThread
                                                    • String ID:
                                                    • API String ID: 1836367815-0
                                                    • Opcode ID: af1b15d7ac2b268976da6c2779987c833496a9f433d0c4805372c534b16d01cf
                                                    • Instruction ID: 8ad87c5e98930e70ea46bb519aac621a24c44336cf277631c13505176deba303
                                                    • Opcode Fuzzy Hash: af1b15d7ac2b268976da6c2779987c833496a9f433d0c4805372c534b16d01cf
                                                    • Instruction Fuzzy Hash: B1519F70E002159FDB54DFA9D894A9EB7F2AF84310F55842DE409EB360DB70AE46CBA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 06CCCF3D
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.386603188.0000000006CC0000.00000040.00000001.sdmp, Offset: 06CC0000, based on PE: false
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: 906013f9e3cd766dbadecd1b9e679d929c377fb11b6acf14dde969acc230ea9d
                                                    • Instruction ID: abbafed7d4b850000d45ddea46da4d9dadda9b6a9449f1e5d543fcf5b9ac38b8
                                                    • Opcode Fuzzy Hash: 906013f9e3cd766dbadecd1b9e679d929c377fb11b6acf14dde969acc230ea9d
                                                    • Instruction Fuzzy Hash: E811F2B59003499FDB10CF99D889BDEFBF8EB48324F14845AE558A7200D374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367355132.000000000082D000.00000040.00000001.sdmp, Offset: 0082D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8f50295bf1739a6bacad76de40b0f2aa8a89e528687bad4ff34dea0215622212
                                                    • Instruction ID: 34ae06e20a66348b2cc4b199d3a427ec8dcf79d4210541d56817d99a704f5110
                                                    • Opcode Fuzzy Hash: 8f50295bf1739a6bacad76de40b0f2aa8a89e528687bad4ff34dea0215622212
                                                    • Instruction Fuzzy Hash: 722128B1504344DFDB01DF14E9C0B26BF65FB88318F34C569E9458B246C376D886C7A1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367411661.000000000083D000.00000040.00000001.sdmp, Offset: 0083D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 33e4f3bd5cd9885e9690a374667ee73db6d82db45f40a17b6d37b6d8016d23cd
                                                    • Instruction ID: c41875b312fa9f7b9e0ab77f367ed02663c56a695a79caee60420d02a302acad
                                                    • Opcode Fuzzy Hash: 33e4f3bd5cd9885e9690a374667ee73db6d82db45f40a17b6d37b6d8016d23cd
                                                    • Instruction Fuzzy Hash: 002107B1504344DFDB01DF10E5C0B26BBA5FBC4318F24C66DE9498B246C776E846CAA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367411661.000000000083D000.00000040.00000001.sdmp, Offset: 0083D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4519e3745d65dc241b9a6b18798999f1919aff567f363f286079c829338b2c9e
                                                    • Instruction ID: 8983cc73ba97cd687d1d5a68a3e95bd680b4ce3e506ed97e13d540bfe25d098c
                                                    • Opcode Fuzzy Hash: 4519e3745d65dc241b9a6b18798999f1919aff567f363f286079c829338b2c9e
                                                    • Instruction Fuzzy Hash: D92137B1504744DFCB18CF10E4D0B16BB65FBC4718F24C569D8498B346C33AD807CAA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367355132.000000000082D000.00000040.00000001.sdmp, Offset: 0082D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4ebfea70809b752dd87daf1091c6fefd11053e22c75fac3715a094701740d1c
                                                    • Instruction ID: 44e6527c5a24b669f73b70d1ba683948e1cdb8f042eb8f23352b6644040ca460
                                                    • Opcode Fuzzy Hash: a4ebfea70809b752dd87daf1091c6fefd11053e22c75fac3715a094701740d1c
                                                    • Instruction Fuzzy Hash: 8711D376804380DFDB11CF10E6C4B56BF71FB88324F24C6A9D8454B656C376D896CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367411661.000000000083D000.00000040.00000001.sdmp, Offset: 0083D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 918b5a484225ea750dc867420c5dc02e162b71f4ae55fd38ff69526cb1fe86f3
                                                    • Instruction ID: 33a5fd95bb26f2d62634ac409aed5f69d600f49bb2546055c3b9b51c2d72a6cd
                                                    • Opcode Fuzzy Hash: 918b5a484225ea750dc867420c5dc02e162b71f4ae55fd38ff69526cb1fe86f3
                                                    • Instruction Fuzzy Hash: 8311BE75504780CFCB15CF10E5D4B15BB71FB84714F24C6AAD8498B656C33AD84BCBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367411661.000000000083D000.00000040.00000001.sdmp, Offset: 0083D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 918b5a484225ea750dc867420c5dc02e162b71f4ae55fd38ff69526cb1fe86f3
                                                    • Instruction ID: b30aee90ac344d2f2e5de3f79d5bd25cb3854cc9363b7d2790d9b0f942dac4a3
                                                    • Opcode Fuzzy Hash: 918b5a484225ea750dc867420c5dc02e162b71f4ae55fd38ff69526cb1fe86f3
                                                    • Instruction Fuzzy Hash: 3A118E75904280DFDB11CF10D5C4B16BB71FB84314F24C6A9D8498B656C33AE85ACB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367355132.000000000082D000.00000040.00000001.sdmp, Offset: 0082D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1816de0be84a701d8aba112feaa83cca38847ad5b123bb294bfb62e5f55d3adb
                                                    • Instruction ID: f297cc2130b6dafce3e2384654574538a9152484eb0764cd9ac88a523d33d439
                                                    • Opcode Fuzzy Hash: 1816de0be84a701d8aba112feaa83cca38847ad5b123bb294bfb62e5f55d3adb
                                                    • Instruction Fuzzy Hash: 9701F7B14083A49EE7104E15DC84B66BF98FF41738F18C55AED059A246C37C9C84C6B1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.367355132.000000000082D000.00000040.00000001.sdmp, Offset: 0082D000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 832ba049a3a64d0732231269a7003d42f20daf67dade4539164f459ad03c6126
                                                    • Instruction ID: e596caaebc2f51aafcffc815d3353caa1d9a907c38c19e3d05c8964108871b87
                                                    • Opcode Fuzzy Hash: 832ba049a3a64d0732231269a7003d42f20daf67dade4539164f459ad03c6126
                                                    • Instruction Fuzzy Hash: 9EF096714043549EE7108E15DCC8B62FFA8EF85734F18C45AED485B286C3799C84CAB1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Non-executed Functions

                                                    Executed Functions

                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 620b49610278cc14509eaac808248615a8949676a05760c1393fa0ec599c283a
                                                    • Instruction ID: 75de4ffbc9abc134a1ac9c75c60cb9d80d900a8fa2216a7874e25a544fb36b0b
                                                    • Opcode Fuzzy Hash: 620b49610278cc14509eaac808248615a8949676a05760c1393fa0ec599c283a
                                                    • Instruction Fuzzy Hash: 97412B70E056489FDB08DFAAD84469EBBF3AFC8300F14C5B9C508AB269EB344A458F41
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 00A5B6F0
                                                    • GetCurrentThread.KERNEL32 ref: 00A5B72D
                                                    • GetCurrentProcess.KERNEL32 ref: 00A5B76A
                                                    • GetCurrentThreadId.KERNEL32 ref: 00A5B7C3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 22daca47b3ba1bed9ba216edf3730e015b0da9ed4340054d79a5b6e97a64e745
                                                    • Instruction ID: 44bf03b78cad596f65d09b77e114d3cea28eeae24cc0b951ab5609eda7ae21ef
                                                    • Opcode Fuzzy Hash: 22daca47b3ba1bed9ba216edf3730e015b0da9ed4340054d79a5b6e97a64e745
                                                    • Instruction Fuzzy Hash: 4D5153B0D017498FDB14CFA9D588BEEBBF0BF88315F24845AE849A7290C7745884CF61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 00A5B6F0
                                                    • GetCurrentThread.KERNEL32 ref: 00A5B72D
                                                    • GetCurrentProcess.KERNEL32 ref: 00A5B76A
                                                    • GetCurrentThreadId.KERNEL32 ref: 00A5B7C3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 7e3330412dee9f71e0f71c335e1359cb65f69d41b3326f311108a8346bd23a85
                                                    • Instruction ID: 23d5553b03349239c902a415a64422f516f41a826c2898041ddd6ca3a20a40e2
                                                    • Opcode Fuzzy Hash: 7e3330412dee9f71e0f71c335e1359cb65f69d41b3326f311108a8346bd23a85
                                                    • Instruction Fuzzy Hash: 2D5153B0D017498FDB14CFA9D588B9EBBF0BF88315F24846AE809A7790C7745984CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00A598D6
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 76298c482b47a7a3bba4380295f9158ac5e247388d46116afd30d2ec52b941a7
                                                    • Instruction ID: 6abab0beea623c31fd512f5c29708c2ab00c34c1eb455c4f21b1c1789ac322f3
                                                    • Opcode Fuzzy Hash: 76298c482b47a7a3bba4380295f9158ac5e247388d46116afd30d2ec52b941a7
                                                    • Instruction Fuzzy Hash: C4711570A00B058FDB24DF29D54579BBBF1FF88315F00892AD98ADBA50D734E849CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 075E19D3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: 410bcc02685773ade87e6aeff94564ce269bf4676c1aaa050a87292feba0a883
                                                    • Instruction ID: 9424fef68d48af0a56b5d39cef7299cacaffa0f7e61eaa1997977da1c243ba79
                                                    • Opcode Fuzzy Hash: 410bcc02685773ade87e6aeff94564ce269bf4676c1aaa050a87292feba0a883
                                                    • Instruction Fuzzy Hash: A751F9B190032DDFDB24CF95C880BDDBBB6BF48314F1584AAE948A7250DB705A89CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %
                                                    • API String ID: 0-2567322570
                                                    • Opcode ID: c52602aceddf37bc3bd52018083940e8b3309d1c36613f8cb7b234826da3882e
                                                    • Instruction ID: 78fceb0cf932debe595168e889a14e50a2c9dcc65ac35779aa00765c7d94c294
                                                    • Opcode Fuzzy Hash: c52602aceddf37bc3bd52018083940e8b3309d1c36613f8cb7b234826da3882e
                                                    • Instruction Fuzzy Hash: ADF17E70D09218CFEB90CFA8D8487FDB7B5FB4A314F1052A5D55AA7386E73099809F92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 075E19D3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: 9b093904bf01f0c65084637d036872384f44930e7b83a54ce604dcfb370b15b7
                                                    • Instruction ID: 3aaa431160b43947ce5905c05d551f06b2448e8d1335a67a0518144d41199619
                                                    • Opcode Fuzzy Hash: 9b093904bf01f0c65084637d036872384f44930e7b83a54ce604dcfb370b15b7
                                                    • Instruction Fuzzy Hash: 6E5107B190032DDFDB24CF95C880BDDBBB6BF48314F1584AAE948A7250DB705A89CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00A5FE0A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 94749c414e3d3e0fd2ded58a744e7e37a5c36331dd76e4491e7e7ebb45faac10
                                                    • Instruction ID: 724b7b79c2a4ddc9aca667b1ab68d39c841b9b8ba910b659a497c4cbc004a510
                                                    • Opcode Fuzzy Hash: 94749c414e3d3e0fd2ded58a744e7e37a5c36331dd76e4491e7e7ebb45faac10
                                                    • Instruction Fuzzy Hash: C651B0B1D003499FDB14CFA9D884ADEBBB5FF48314F24812AE819AB211D7749985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00A5FE0A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: a1463f39d4ed3f0850d3e7a72dc0a370af8ef09082838ef87b5fd04226fcda1b
                                                    • Instruction ID: a651fc6e30da96d14601b59d53f25e0b2422b6402ef4b5373446b8fa4bb03962
                                                    • Opcode Fuzzy Hash: a1463f39d4ed3f0850d3e7a72dc0a370af8ef09082838ef87b5fd04226fcda1b
                                                    • Instruction Fuzzy Hash: B041B0B1D003099FDF14CFA9D884ADEBBB5BF48314F24812AE819AB210D7749945CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00A55421
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 9a6885f08c33d439fa29d465feb9a48aff70dd5d8a6723e76f0df28cc55e25e1
                                                    • Instruction ID: 4eae4c8ece357d7dbed453d1ffdfebb672141227fffc96bdbd9e706a8e28eec9
                                                    • Opcode Fuzzy Hash: 9a6885f08c33d439fa29d465feb9a48aff70dd5d8a6723e76f0df28cc55e25e1
                                                    • Instruction Fuzzy Hash: BB41F6B0C0462CCFDB24CFA9C894BDEBBB5BF48305F518069D809AB251D7756989CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00A55421
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 6c5a5428cee0627344b841d633188f427c69eaf843254eea9f6f7ab1e6c593da
                                                    • Instruction ID: ac8ff71309373c9f9a91325ec6d0343f125a6b39470010acf52e8d13cefe9158
                                                    • Opcode Fuzzy Hash: 6c5a5428cee0627344b841d633188f427c69eaf843254eea9f6f7ab1e6c593da
                                                    • Instruction Fuzzy Hash: DA41F5B0C0062CCFDB24CFA5C894BDEBBB6BF48305F618069D849AB251D775598ACF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075E1D8D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: d6fd265145fb00114339a54a8bcbd797f12ecc43f2107ecb83dca8b96454b607
                                                    • Instruction ID: e6f7bbd049da689e15476192ebb2d28425577a43b1ecc92931c5c8ed8e7a7a5c
                                                    • Opcode Fuzzy Hash: d6fd265145fb00114339a54a8bcbd797f12ecc43f2107ecb83dca8b96454b607
                                                    • Instruction Fuzzy Hash: 232114B1901359DFCB54CFAAD885BDEBBF4FB48320F10842AE958A3250D774A944CFA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075E1D8D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 28792c17a6b332fe917a9da6e3e6c780011d80de2ce6dfd73828299161324141
                                                    • Instruction ID: 4391c643bfec3eb885ac45b93b7ea48832597a24eb00f2e5b4fdb15ff3a5dfbc
                                                    • Opcode Fuzzy Hash: 28792c17a6b332fe917a9da6e3e6c780011d80de2ce6dfd73828299161324141
                                                    • Instruction Fuzzy Hash: 992125B1900359DFCB14CF9AD884BDEBBF4FB48310F00842AE918A3250D774A940CFA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 075E1B3F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: e3f6191c3a92b52159ef55ebbc2691026aad7e045e84871343956f9f79a7741b
                                                    • Instruction ID: bd187a7a04b34eba43153e6282879a14dde6af467402a7f8be7b851793248746
                                                    • Opcode Fuzzy Hash: e3f6191c3a92b52159ef55ebbc2691026aad7e045e84871343956f9f79a7741b
                                                    • Instruction Fuzzy Hash: 0321F7B1D0065A9FCB14CF9AD8857DEFBF8BB48224F14812AD458B7240E774A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A5B93F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 839a3b2a4478de13472d598a5e434ae119e918ed6a6145af7a383a28bc680fd3
                                                    • Instruction ID: f6ccc2d1e556e64e1bed139466edcfa53535e97d6776909e32ccf819ce780a5f
                                                    • Opcode Fuzzy Hash: 839a3b2a4478de13472d598a5e434ae119e918ed6a6145af7a383a28bc680fd3
                                                    • Instruction Fuzzy Hash: 5F21E0B5D012499FDB10CFA9D884AEEBFF4FB48320F14846AE954A3250D378A955CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075E1C07
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: d0b3abe59015093755a8095acce584c05cfe1951ca52286e286955934fbf891b
                                                    • Instruction ID: 64e3b1b05df32d1fff6223adae4d14f2637dd4868fa5b65430b512fc77fea294
                                                    • Opcode Fuzzy Hash: d0b3abe59015093755a8095acce584c05cfe1951ca52286e286955934fbf891b
                                                    • Instruction Fuzzy Hash: 5221F3B1901359DFCB10CF9AD884BDEBBF4FB48320F54842AE958A3250D378A540CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A5B93F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: d6ed773d57f57daa199cb92ee71a0e9725086005a78cfd7cf2ccf92dca1e5020
                                                    • Instruction ID: 88cc3238cb025cb7f697535ec8be5279f3ffee0ff6ae49a025868fc3275ae2ba
                                                    • Opcode Fuzzy Hash: d6ed773d57f57daa199cb92ee71a0e9725086005a78cfd7cf2ccf92dca1e5020
                                                    • Instruction Fuzzy Hash: 5C21E2B59002499FDB10CFA9D884BDEBBF8FB48320F14801AE954A3350D374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075E1C07
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: e0f194c788e6dde62776ef3cd5d8779e5ea444acdbe647ec69b3cd72d11f1062
                                                    • Instruction ID: 51b6faf634bd5828d90f57382a1f992e5a490bcecdc665940a1a2f1ccd2f544f
                                                    • Opcode Fuzzy Hash: e0f194c788e6dde62776ef3cd5d8779e5ea444acdbe647ec69b3cd72d11f1062
                                                    • Instruction Fuzzy Hash: D421D0B59012599FCB10CF9AD884BDEBBF8FB48320F50842AE958A7250D374A544CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 075E1B3F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: c0bfdac45629b8f463102fd55eaf8301535c484668af8c84a19cc40fa7f4b95e
                                                    • Instruction ID: d1cfe837e372c875d871c68bcff1e910e2c17383173d540ece6cc6c3a1f21dc7
                                                    • Opcode Fuzzy Hash: c0bfdac45629b8f463102fd55eaf8301535c484668af8c84a19cc40fa7f4b95e
                                                    • Instruction Fuzzy Hash: EF2117B1D0065A9FCB14CF9AD8857DEFBF8BB48224F14812AD458B7240E778A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A59951,00000800,00000000,00000000), ref: 00A59B62
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: b545facd187eb2cbe6a559aa849a85c13b04131020d508fd7909bb9c178a567d
                                                    • Instruction ID: ff6c7f3afda9f8aacbb032fb353a3f2e2f744657cf2fd35607ae5781c443ea2e
                                                    • Opcode Fuzzy Hash: b545facd187eb2cbe6a559aa849a85c13b04131020d508fd7909bb9c178a567d
                                                    • Instruction Fuzzy Hash: 1A11C2B69002499BDB10CF9AD488ADBFBF4AB48315F15852AE915AB200C375A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A59951,00000800,00000000,00000000), ref: 00A59B62
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 1ded98484df7393c99ecc8e527f1d5cba501d1b54ed31074ae0cfbfbbb0244d0
                                                    • Instruction ID: 8408f13fc81c5ad60dbd9ae6eb772ae355441916bb46c750cb61e485f4aebd96
                                                    • Opcode Fuzzy Hash: 1ded98484df7393c99ecc8e527f1d5cba501d1b54ed31074ae0cfbfbbb0244d0
                                                    • Instruction Fuzzy Hash: 161106B6C002498FDB10CFA9D484AEEFBF5BB88324F15856AD855A7600C375A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 075E4678
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotification
                                                    • String ID:
                                                    • API String ID: 2591292051-0
                                                    • Opcode ID: f7cebf9c4f6638af2afe31939f4d4e37b1b6727e23be04bda68f5b6087f5477d
                                                    • Instruction ID: 1c18b73b2f6775bf8891d9304444116c7e9a94f31e747aa68705440439e25132
                                                    • Opcode Fuzzy Hash: f7cebf9c4f6638af2afe31939f4d4e37b1b6727e23be04bda68f5b6087f5477d
                                                    • Instruction Fuzzy Hash: 191113B58002499FCB10CF99D488BDEBBF8EB48324F15846AE958A7640D778A585CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075E1CC3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: c99ff5a1a5a9cf9b88e83fc6c14d069376b7499a76b2891b421ae1a3e7f1aab6
                                                    • Instruction ID: eaadf0a279e960eaf50f05ac1a6fd3dbb5985857221271f8189c56ea1e7ff921
                                                    • Opcode Fuzzy Hash: c99ff5a1a5a9cf9b88e83fc6c14d069376b7499a76b2891b421ae1a3e7f1aab6
                                                    • Instruction Fuzzy Hash: E911D2B59006499FCB10CF9AD884BDEBFF8FB48324F148419E559A7250C775A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075E1CC3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: a3041a647a24045ef23ee5706a140c7f0012e9ed3f647e050bd6facd76018ef3
                                                    • Instruction ID: 5d11eb909841c6cf66ee8990d8aac6bcb627d7208dbc0f8160a08815ecddd8d4
                                                    • Opcode Fuzzy Hash: a3041a647a24045ef23ee5706a140c7f0012e9ed3f647e050bd6facd76018ef3
                                                    • Instruction Fuzzy Hash: 7211E3B5900649DFCB10CF9AD884BDEBBF8FB48324F148419E559A7250C375A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 075E4678
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotification
                                                    • String ID:
                                                    • API String ID: 2591292051-0
                                                    • Opcode ID: eed630c5bc84666e0b8a9a1056a8fe7b09579525ddc6f3b1b28d953af6d8fa62
                                                    • Instruction ID: 95bb4317f9c6c306cc0948750a41fd5287b01d9f4a0e67670533b773661811c0
                                                    • Opcode Fuzzy Hash: eed630c5bc84666e0b8a9a1056a8fe7b09579525ddc6f3b1b28d953af6d8fa62
                                                    • Instruction Fuzzy Hash: 7A1133B18002498FCB10CF99C488BDEBBF8EB48320F15846AE958A7240D738A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: 066cbdf25334774ea3d0c7c8c0dbdfc43e20201a0e10482e36d508abdc4c0f64
                                                    • Instruction ID: 257c2a3d5ff35cf35e42c6de9115bc8b6f4e28450aa8595e020e27ad1066a94f
                                                    • Opcode Fuzzy Hash: 066cbdf25334774ea3d0c7c8c0dbdfc43e20201a0e10482e36d508abdc4c0f64
                                                    • Instruction Fuzzy Hash: 3111F2B18006598FCB10CF9AD484BDEBBF8BB48324F10841AE559A7240C775A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00A598D6
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 58e0644e4bccd4d31afb40bf95d3561c7a966ace8284029821010d6a403d693a
                                                    • Instruction ID: 45638ee7cca02ef11622b1f1010fb3516e4830c815bd338405a3f573f211f4bf
                                                    • Opcode Fuzzy Hash: 58e0644e4bccd4d31afb40bf95d3561c7a966ace8284029821010d6a403d693a
                                                    • Instruction Fuzzy Hash: 3C11CDB5C002498BDB10CF9AD484BDEFBF4AB89324F14856AD859A7610D378A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 075E35FD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: 499f67d9ce4efc60c94abce9f1626b3cc2994c352518f96b4af0bc7744d97663
                                                    • Instruction ID: 91055ca13c865c4a6059b872e954a7c3a458331ab408b223d04df53e44b8cf61
                                                    • Opcode Fuzzy Hash: 499f67d9ce4efc60c94abce9f1626b3cc2994c352518f96b4af0bc7744d97663
                                                    • Instruction Fuzzy Hash: AE11F2B58003499FDB20CF99D888BDEBBF8FB48324F10881AE455A7200C374A584CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?), ref: 00A5FF9D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 0c4dbf1e6549d45ba8e146c4f35c71dceb8d4ea5d8db2ca701325d583db69902
                                                    • Instruction ID: d4ae0113bbf7cd780ccba0e2f012cf2b7fd950f2daf23bbd0503c5879edf0d4c
                                                    • Opcode Fuzzy Hash: 0c4dbf1e6549d45ba8e146c4f35c71dceb8d4ea5d8db2ca701325d583db69902
                                                    • Instruction Fuzzy Hash: 461133B58002488FDB20CF99D488BDEFBF4FB48320F10841AE854A7240C374AA45CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 075E35FD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: f9ab2e6912fecaf142a0b8cbfd86ed2ff934b7abbe313bf77dd1de0410d0fe24
                                                    • Instruction ID: 29b48d3cc8afeef9b5c8fba683e9e63c1a496a94ec203586e3a61d8dcc3420c6
                                                    • Opcode Fuzzy Hash: f9ab2e6912fecaf142a0b8cbfd86ed2ff934b7abbe313bf77dd1de0410d0fe24
                                                    • Instruction Fuzzy Hash: 9911D0B58003599FDB20CF99D889BDEBBF8FB48324F14841AE559A7650C374A984CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?), ref: 00A5FF9D
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.408372140.0000000000A50000.00000040.00000001.sdmp, Offset: 00A50000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 3a5bf5a7bfafae8868ae4788c86c5d349f9bd2ccfa63fbbecb9eb00a611cebf1
                                                    • Instruction ID: 2004071622033952f4f40a4f5defa7f397a2266f8cc8e2ec50f7aa00bc9e436f
                                                    • Opcode Fuzzy Hash: 3a5bf5a7bfafae8868ae4788c86c5d349f9bd2ccfa63fbbecb9eb00a611cebf1
                                                    • Instruction Fuzzy Hash: C411D0B58002499FDB10CF99D588BDEFBF8FB48324F14851AE955A7640C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.424831132.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: efe6c0f7ae96068241bad6c65f01c3e97c18a9dccce23f2fb18cfc33a0dd5bfc
                                                    • Instruction ID: 3ca04989df4cc53ad2da1a8c9dd096080c9278fbe27420d03815773237ef1b77
                                                    • Opcode Fuzzy Hash: efe6c0f7ae96068241bad6c65f01c3e97c18a9dccce23f2fb18cfc33a0dd5bfc
                                                    • Instruction Fuzzy Hash: D611E2B5800659CFCB10CF9AD488BDEFBF8FB48324F14845AD559A7250C774A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %
                                                    • API String ID: 0-2567322570
                                                    • Opcode ID: be9c704f9a125ab8df08d907e0cec38a498b1ea21fc403b55b696460f62a8c21
                                                    • Instruction ID: b983ce8798cb6c11bcd3205dea560ccc320e5686a8c4a50e5a55ee21a0f52270
                                                    • Opcode Fuzzy Hash: be9c704f9a125ab8df08d907e0cec38a498b1ea21fc403b55b696460f62a8c21
                                                    • Instruction Fuzzy Hash: E8315A70D0911CCFEBA4CF58C9497ECB6B5AB4A320F1051A6C55DE7282F7318E809FA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a439e39a1a805c4d639b6e97164ccbb1792470390765482455a036eee5da0df7
                                                    • Instruction ID: e068877244106711afbd6cd8b02711c486410ead67f56f7d4f0968d567bbec45
                                                    • Opcode Fuzzy Hash: a439e39a1a805c4d639b6e97164ccbb1792470390765482455a036eee5da0df7
                                                    • Instruction Fuzzy Hash: D6117330B141289FDBB89BB6881077E76A6ABC5764F089139E916CB345FB39CD0087D2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 14bf2c1d3ddf6dc801034f7764c8abaf81a4ab42bfe7802d54674026d15de90f
                                                    • Instruction ID: 603992ae0449b0381e9dd1cb3ee47aa4e5c2350184590077450cd7ad82773374
                                                    • Opcode Fuzzy Hash: 14bf2c1d3ddf6dc801034f7764c8abaf81a4ab42bfe7802d54674026d15de90f
                                                    • Instruction Fuzzy Hash: B701D130E46288EFDB44FFB4E445BAE7BB2EB45208F1089A9C504AB215EE305F49CB41
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0e8fe69e86d11f47bdf4c68a56a31ff6ca615d732bb47227a87aae7eed86d4e2
                                                    • Instruction ID: b9344b0c1bf791af9d08f9f3af0f03443e4e811442452d0ebb5c12ace377d921
                                                    • Opcode Fuzzy Hash: 0e8fe69e86d11f47bdf4c68a56a31ff6ca615d732bb47227a87aae7eed86d4e2
                                                    • Instruction Fuzzy Hash: 7BF0AF30A41248AFDB84EFB4D444AADB7B6EB85208F504969D504A7214EF30AE48CF40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 92535f6c55a6d1e7107225096b2a6ccf0a3aa03d073da3180b61396192f14d79
                                                    • Instruction ID: 4f975afbb9df172fbdbeec6d7076130700d93c6c38acd1e2c9d2b6ecd89aacf7
                                                    • Opcode Fuzzy Hash: 92535f6c55a6d1e7107225096b2a6ccf0a3aa03d073da3180b61396192f14d79
                                                    • Instruction Fuzzy Hash: DCE0E534D06308EFDB44EFA4E559AADBBB9EB45302F10A1A9C805A3345EB349E40CF81
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.422927892.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 41f0defbf626e84d4fcb40d7ff80f44f8a30bbba714fa3934208f68ae4b6a18b
                                                    • Instruction ID: df82a307cf4e34c9bd0fbd5336888f5cf31b3c489ab151a7482c030a2a59e44a
                                                    • Opcode Fuzzy Hash: 41f0defbf626e84d4fcb40d7ff80f44f8a30bbba714fa3934208f68ae4b6a18b
                                                    • Instruction Fuzzy Hash: 15F06D3090422ACFEB50DF20D8547E8B7F5EB0D320F1042A5D44993388EB705E95CF80
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Non-executed Functions

                                                    Executed Functions

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0156FD0A
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 7d1ed9258604978db405e534ef1d25400acef4283211938a8087d2c85f9b09cd
                                                    • Instruction ID: ba5e3f2522dc1b920d7e452925032585552a430dbe8bb47cd4f4b905503f9a98
                                                    • Opcode Fuzzy Hash: 7d1ed9258604978db405e534ef1d25400acef4283211938a8087d2c85f9b09cd
                                                    • Instruction Fuzzy Hash: D4814E71C083889FDF06CFA5D850ACEBFB5BF59310F1A81AAE944AB262D7349845CF51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 0156B730
                                                    • GetCurrentThread.KERNEL32 ref: 0156B76D
                                                    • GetCurrentProcess.KERNEL32 ref: 0156B7AA
                                                    • GetCurrentThreadId.KERNEL32 ref: 0156B803
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: dbe2e864119ce73c303fd615775ae44a8706c0b9c0623bb6bfb66314982e3600
                                                    • Instruction ID: cea6b6dcad173baadb16e94892d2483ea9014ea602f971d2c0fb4f676ffea33d
                                                    • Opcode Fuzzy Hash: dbe2e864119ce73c303fd615775ae44a8706c0b9c0623bb6bfb66314982e3600
                                                    • Instruction Fuzzy Hash: D15144B49002498FDB14CFA9D5887DEBBF4BF48314F25846AE019AB390D7789845CFA6
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 0156B730
                                                    • GetCurrentThread.KERNEL32 ref: 0156B76D
                                                    • GetCurrentProcess.KERNEL32 ref: 0156B7AA
                                                    • GetCurrentThreadId.KERNEL32 ref: 0156B803
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 93ef05207e429806455cbbdfb8bfd62dcb74da0297b19e69fd3a1d0783d85c37
                                                    • Instruction ID: 77a944c584f2c34b7e4914897f128ba868f6d9c11802ffe515294a9e67cd8e93
                                                    • Opcode Fuzzy Hash: 93ef05207e429806455cbbdfb8bfd62dcb74da0297b19e69fd3a1d0783d85c37
                                                    • Instruction Fuzzy Hash: 665146B49003498FDB14CFA9D588BDEBBF5BF48314F248469E019AB350D7789844CFA6
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0156962E
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: cafffa87df9a58504658469ba428cb0f4a2b2af798829b6e904579b8f168ca90
                                                    • Instruction ID: 1e5b160639be0aaefc8996f2d714297022a422ae3fbccdf8cbd4eb73ec068ea4
                                                    • Opcode Fuzzy Hash: cafffa87df9a58504658469ba428cb0f4a2b2af798829b6e904579b8f168ca90
                                                    • Instruction Fuzzy Hash: 467136B0A00B068FDB64DF2AC44475ABBF5FF88218F008A2DD58ADBA50D775E855CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0156FD0A
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 25ae34b02c19cdebe2d3542067900a6bf33a24237c84a2965d9e4e15b5974766
                                                    • Instruction ID: 7544306db43dd7d110c1b186046209c2353763593759f81e772cdcb73fde9d66
                                                    • Opcode Fuzzy Hash: 25ae34b02c19cdebe2d3542067900a6bf33a24237c84a2965d9e4e15b5974766
                                                    • Instruction Fuzzy Hash: 2141B0B1D003099FDB14CFA9D894ADEBBB5BF48314F24812AE819AB250D775A985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0156BD87
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 152781aebf1f2a87e214cda728d2e0882876ef3205484d709b5d66d5b17e0213
                                                    • Instruction ID: fe745354854a26a9cf7f73b81de930589304094faf5cae153f5afbf9d2e769bb
                                                    • Opcode Fuzzy Hash: 152781aebf1f2a87e214cda728d2e0882876ef3205484d709b5d66d5b17e0213
                                                    • Instruction Fuzzy Hash: D121E2B59002489FDB10CFAAD884ADEBBF8FB48320F14841AE954A7350D378A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0156BD87
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: fbe4756f92fe1cf2f8d606dfc76c765a039f982ebe613191056808ab7ba9d348
                                                    • Instruction ID: 1b9df30db99b18e00ff26c680a8596b16eac1833ededc507b04b14687ea82c72
                                                    • Opcode Fuzzy Hash: fbe4756f92fe1cf2f8d606dfc76c765a039f982ebe613191056808ab7ba9d348
                                                    • Instruction Fuzzy Hash: B82100B59002489FDB00CFA9D584BEEBBF8BB48320F14841AE958B7350C378A950CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015696A9,00000800,00000000,00000000), ref: 015698BA
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: ca13f6f802491145dab0329044274da3e3db6663f13389d3b9f5dbfe0f823caf
                                                    • Instruction ID: 5acff44bc57d431911c0e819404602d87c9426114ea6bddd1ba0f5bf18f514e8
                                                    • Opcode Fuzzy Hash: ca13f6f802491145dab0329044274da3e3db6663f13389d3b9f5dbfe0f823caf
                                                    • Instruction Fuzzy Hash: AB1103B69002498FDB10CF9AC444BDEFBF8FB88314F04842EE519AB600C375A945CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015696A9,00000800,00000000,00000000), ref: 015698BA
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 59dc44ca887813d35ed772211e7a6388f4d1b723d40e25a57233d251858de22e
                                                    • Instruction ID: 13901a72ef9d04b947855a60bc5463620d31a2733fb1580dd462e4f109c8c307
                                                    • Opcode Fuzzy Hash: 59dc44ca887813d35ed772211e7a6388f4d1b723d40e25a57233d251858de22e
                                                    • Instruction Fuzzy Hash: 201112B6D002098FDB10CFA9C444BDEFBF8BB48314F05842AD515A7600C374A545CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0156962E
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 1e2716e78c318b31a6f400668927109b2ed867213c629b87cfb235d837c6b7d5
                                                    • Instruction ID: 66b36a559a1d15eef88e5bdb40a45a0686e7bfe063eb8f6578bea913bb3b6e12
                                                    • Opcode Fuzzy Hash: 1e2716e78c318b31a6f400668927109b2ed867213c629b87cfb235d837c6b7d5
                                                    • Instruction Fuzzy Hash: 1D1110B1C003498FDB10CF9AC444BDEFBF8BB88224F14842AD459A7200C378A546CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?), ref: 0156FE9D
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 9b963aed7bf2bf948e177e7587ac4cbb8c21bfcef882dd9766038e9a7cfa201e
                                                    • Instruction ID: 4a7f916179be97d6cf4d7ff5ef0f79c363ac5c85cd97aad9b6c1bdf87f1d009f
                                                    • Opcode Fuzzy Hash: 9b963aed7bf2bf948e177e7587ac4cbb8c21bfcef882dd9766038e9a7cfa201e
                                                    • Instruction Fuzzy Hash: 9C1100B58002498FDB10CF99D989BDEBBF8FB48324F10841AE954A7240C378A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?), ref: 0156FE9D
                                                    Memory Dump Source
                                                    • Source File: 00000016.00000002.392468070.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: aa60feb919dd4f8d6b17ed7881364bcd424186eaebd347785f920b2917427d6d
                                                    • Instruction ID: 7d058f9b5f1151641989ba5609039f91b6f686c6e0a575efd656158d7187c3b1
                                                    • Opcode Fuzzy Hash: aa60feb919dd4f8d6b17ed7881364bcd424186eaebd347785f920b2917427d6d
                                                    • Instruction Fuzzy Hash: 461100B5C002498FDB10CF99D589BDEBBF8FB48724F14881AE958B7240C378A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Non-executed Functions

                                                    Executed Functions

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 02C7962E
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 890828d415752f5f69d68b84850dca7dda2a0943289e9cb087a55824791260a9
                                                    • Instruction ID: 9f4a4e5785697cb663efc252397fb73872274f16811ab5e4381008b1f57260c9
                                                    • Opcode Fuzzy Hash: 890828d415752f5f69d68b84850dca7dda2a0943289e9cb087a55824791260a9
                                                    • Instruction Fuzzy Hash: 45712370A00B058FD764DF2AD44475ABBF1BF88314F008A2DE58ADBA50DB74E949CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C7FD0A
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 8b11f7c833dff8ffef65db01a099bd23faee10b2b07f241787520b990da2dd0b
                                                    • Instruction ID: a4630a769063f6ef8d0dce4c7ee7135bfda58a1a6bb0b5aff4a9914af8a9a4bd
                                                    • Opcode Fuzzy Hash: 8b11f7c833dff8ffef65db01a099bd23faee10b2b07f241787520b990da2dd0b
                                                    • Instruction Fuzzy Hash: 0751C0B1D10209DFDB14CFA9D884ADEBBB5BF88314F24812AE815AB210D7749945CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C7FD0A
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: bbeb6ee2782db908e2d00fbe591f0e84df93db52507db61797da88ec06efa2c2
                                                    • Instruction ID: 0f759069d2e18f731e8b5c76e6adabf5f54c96551c10c2ff2e22f59e1f0d5c69
                                                    • Opcode Fuzzy Hash: bbeb6ee2782db908e2d00fbe591f0e84df93db52507db61797da88ec06efa2c2
                                                    • Instruction Fuzzy Hash: B351AFB1D10309DFDB14CF9AD884ADEBBB5BF88314F24812AE819AB250D774A945CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C7BCC6,?,?,?,?,?), ref: 02C7BD87
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 1578de5b397f79a08a7fd9bbd6d7ac46c2e0a7df860d5289637cee0eee7acc8c
                                                    • Instruction ID: 013b27b631fb7234d8cf82bd0a4d1d1bd504be36af2447187c7ecea60cee7bc5
                                                    • Opcode Fuzzy Hash: 1578de5b397f79a08a7fd9bbd6d7ac46c2e0a7df860d5289637cee0eee7acc8c
                                                    • Instruction Fuzzy Hash: F521E4B5900248EFDB10CF9AD984ADEFBF4FB48324F14845AE954A7350D374A954CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C7BCC6,?,?,?,?,?), ref: 02C7BD87
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: e52afda3ba14999bc78087f6ac2acae4adc429fc0fb3af9d8f5a618c49cced15
                                                    • Instruction ID: f2171101b6ea89a2dffb59b161ed986ee9870299785c7820bc26fc74460cb92f
                                                    • Opcode Fuzzy Hash: e52afda3ba14999bc78087f6ac2acae4adc429fc0fb3af9d8f5a618c49cced15
                                                    • Instruction Fuzzy Hash: B721E4B59002499FDB10CFAAD984ADEFFF8FB48324F14845AE954A3350D374A954CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02C796A9,00000800,00000000,00000000), ref: 02C798BA
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 6a36952d35d1d2a0c6cd52e88afc53cfcf7bdba7ecd16405b4f1d6e07383ce9b
                                                    • Instruction ID: 2dc581ffb4ce93e0fb7ce8dab421a371aec9a10be1ec22b51be723a638f79c36
                                                    • Opcode Fuzzy Hash: 6a36952d35d1d2a0c6cd52e88afc53cfcf7bdba7ecd16405b4f1d6e07383ce9b
                                                    • Instruction Fuzzy Hash: 5911D3B69002499FDB10CF9AD444BDEFBF4EF88324F14846EE515A7600C375A945CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02C796A9,00000800,00000000,00000000), ref: 02C798BA
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 49c0a0e4b5efaa87e2e92fb1c3b472d7b389e3b4815eeb583f5460ce360d7d2b
                                                    • Instruction ID: 36ecdf685bb30444059e9c2fd36a76c6b70fa13b5f24289c89b706668c6df52f
                                                    • Opcode Fuzzy Hash: 49c0a0e4b5efaa87e2e92fb1c3b472d7b389e3b4815eeb583f5460ce360d7d2b
                                                    • Instruction Fuzzy Hash: 9311E4B6D002499FDB10CF9AD484BDEFBF4EB88324F14846AD515A7600C375A545CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 02C7962E
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: b05c4c88106ff0b81e538eafda4fce619327224523f14a81cc129804372fd174
                                                    • Instruction ID: a6af3bd2c4157df807e7b46b008b29ccdc46e2681f12adc85d8bf9fb28d32034
                                                    • Opcode Fuzzy Hash: b05c4c88106ff0b81e538eafda4fce619327224523f14a81cc129804372fd174
                                                    • Instruction Fuzzy Hash: 471110B5C002498FCB10CF9AD444BDFFBF4AB88224F14852AD429A7200C374A645CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02C7FE28,?,?,?,?), ref: 02C7FE9D
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 388d00031b4fe9f2c77ef6b22b994ab73ffe40f57d8f5691b996a1f3dc9ba260
                                                    • Instruction ID: 16089ab65d1eacf0ab0ff3ad175c40610ea6b8a680fdb584a16a3d5bc3b47da0
                                                    • Opcode Fuzzy Hash: 388d00031b4fe9f2c77ef6b22b994ab73ffe40f57d8f5691b996a1f3dc9ba260
                                                    • Instruction Fuzzy Hash: 391122B58002488FDB10CF8AD488BDFFBF8EB88324F10845AE958A7641C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02C7FE28,?,?,?,?), ref: 02C7FE9D
                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.427039420.0000000002C70000.00000040.00000001.sdmp, Offset: 02C70000, based on PE: false
                                                    Similarity
                                                    • API ID: LongWindow
                                                    • String ID:
                                                    • API String ID: 1378638983-0
                                                    • Opcode ID: 04b81159f37483c80971d081abbb78e51f86f0370bb63676ee1146dc500cd7bc
                                                    • Instruction ID: eff6ff7e7ec2ee03d7680a3b53d4535307b08f3f7c48770caeed5a5f2c5a6680
                                                    • Opcode Fuzzy Hash: 04b81159f37483c80971d081abbb78e51f86f0370bb63676ee1146dc500cd7bc
                                                    • Instruction Fuzzy Hash: 7411F2B58002499FDB10CF99D589BDFBBF8EB88324F14845AE958A7641C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.426652342.00000000012AD000.00000040.00000001.sdmp, Offset: 012AD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 10c935d8b209aea5c7df35088909627750926ed73362566b94d8b25c80195603
                                                    • Instruction ID: c11a28b1f9795929acc203bce55ad3183f7f547ce3d96fc651a27b8a2013dbd5
                                                    • Opcode Fuzzy Hash: 10c935d8b209aea5c7df35088909627750926ed73362566b94d8b25c80195603
                                                    • Instruction Fuzzy Hash: 882167B1514249DFDB11CF84E8C0B66BF61FB88328F64C569EA450B607C376E806CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.426691866.00000000012BD000.00000040.00000001.sdmp, Offset: 012BD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fccc13e9a90970c7be0c6974ee20bdcdf9614c5115ef96d89fabc72983c4b222
                                                    • Instruction ID: d497ae9abe8212faa5646c7e9f006b258dc238492095c92679b48bfdf194723c
                                                    • Opcode Fuzzy Hash: fccc13e9a90970c7be0c6974ee20bdcdf9614c5115ef96d89fabc72983c4b222
                                                    • Instruction Fuzzy Hash: 262167B1518248DFCB10CF54D4C0B96BB61FB88398F24CD6DD9494B246C376D807CA61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.426691866.00000000012BD000.00000040.00000001.sdmp, Offset: 012BD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 094bfec416bf463ae441e3a293302bb4db49d14f3672da0c478c999b7c32c7e3
                                                    • Instruction ID: dbbfa0afa0a651e28d44f250fe866efcb21152ffce57e61f8590b51e7b6d064c
                                                    • Opcode Fuzzy Hash: 094bfec416bf463ae441e3a293302bb4db49d14f3672da0c478c999b7c32c7e3
                                                    • Instruction Fuzzy Hash: ED2180754083849FCB02CF24D9D4B51BF71EB46354F28C5DAD9498F2A7C33A985ACB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000001C.00000002.426652342.00000000012AD000.00000040.00000001.sdmp, Offset: 012AD000, based on PE: false
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4ebfea70809b752dd87daf1091c6fefd11053e22c75fac3715a094701740d1c
                                                    • Instruction ID: 1f3ca5013310edc9398212c4a4de91a4eed6bb2c040ee63c3fbb8013dcc9132c
                                                    • Opcode Fuzzy Hash: a4ebfea70809b752dd87daf1091c6fefd11053e22c75fac3715a094701740d1c
                                                    • Instruction Fuzzy Hash: E711E1B6804285CFDB12CF44E5C4B16BF71FB84324F2486A9D9450B617C336D456CBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Non-executed Functions