Loading ...

Play interactive tourEdit tour

Analysis Report m72OvSF7e5.exe

Overview

General Information

Sample Name:m72OvSF7e5.exe
Analysis ID:357566
MD5:8c596990203f7d15651498fdba84b5f3
SHA1:bcabae5c0b3ca8e9558ad3f57c3a10e8b5ae6f74
SHA256:a98a739b9ab7b06bf2833f6ef4aa97db1b7c2441365c7104e878c8b29bf90f74
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • m72OvSF7e5.exe (PID: 6316 cmdline: 'C:\Users\user\Desktop\m72OvSF7e5.exe' MD5: 8C596990203F7D15651498FDBA84B5F3)
    • schtasks.exe (PID: 7104 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • m72OvSF7e5.exe (PID: 5808 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
      • schtasks.exe (PID: 5404 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6412 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • m72OvSF7e5.exe (PID: 6620 cmdline: C:\Users\user\Desktop\m72OvSF7e5.exe 0 MD5: 8C596990203F7D15651498FDBA84B5F3)
    • schtasks.exe (PID: 3276 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • m72OvSF7e5.exe (PID: 6096 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
  • dhcpmon.exe (PID: 4608 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 8C596990203F7D15651498FDBA84B5F3)
  • dhcpmon.exe (PID: 404 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 8C596990203F7D15651498FDBA84B5F3)
    • schtasks.exe (PID: 2144 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 6984 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
    • dhcpmon.exe (PID: 5724 cmdline: {path} MD5: 8C596990203F7D15651498FDBA84B5F3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "92421eeb-c456-44c2-ab8d-5a66d7e5ab97", "Group": "Company", "Domain1": "194.5.98.202", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x4356d:$a: NanoCore
    • 0x435c6:$a: NanoCore
    • 0x43603:$a: NanoCore
    • 0x4367c:$a: NanoCore
    • 0x56d27:$a: NanoCore
    • 0x56d3c:$a: NanoCore
    • 0x56d71:$a: NanoCore
    • 0x6fceb:$a: NanoCore
    • 0x6fd00:$a: NanoCore
    • 0x6fd35:$a: NanoCore
    • 0x435cf:$b: ClientPlugin
    • 0x4360c:$b: ClientPlugin
    • 0x43f0a:$b: ClientPlugin
    • 0x43f17:$b: ClientPlugin
    • 0x56ae3:$b: ClientPlugin
    • 0x56afe:$b: ClientPlugin
    • 0x56b2e:$b: ClientPlugin
    • 0x56d45:$b: ClientPlugin
    • 0x56d7a:$b: ClientPlugin
    • 0x6faa7:$b: ClientPlugin
    • 0x6fac2:$b: ClientPlugin
    00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x2080a5:$x1: NanoCore.ClientPluginHost
    • 0x23aac5:$x1: NanoCore.ClientPluginHost
    • 0x2080e2:$x2: IClientNetworkHost
    • 0x23ab02:$x2: IClientNetworkHost
    • 0x20bc15:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x23e635:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x207e0d:$a: NanoCore
      • 0x207e1d:$a: NanoCore
      • 0x208051:$a: NanoCore
      • 0x208065:$a: NanoCore
      • 0x2080a5:$a: NanoCore
      • 0x23a82d:$a: NanoCore
      • 0x23a83d:$a: NanoCore
      • 0x23aa71:$a: NanoCore
      • 0x23aa85:$a: NanoCore
      • 0x23aac5:$a: NanoCore
      • 0x207e6c:$b: ClientPlugin
      • 0x20806e:$b: ClientPlugin
      • 0x2080ae:$b: ClientPlugin
      • 0x23a88c:$b: ClientPlugin
      • 0x23aa8e:$b: ClientPlugin
      • 0x23aace:$b: ClientPlugin
      • 0x154512:$c: ProjectData
      • 0x207f93:$c: ProjectData
      • 0x23a9b3:$c: ProjectData
      • 0x20899a:$d: DESCrypto
      • 0x23b3ba:$d: DESCrypto
      Click to see the 33 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      28.2.dhcpmon.exe.2e09660.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      28.2.dhcpmon.exe.2e09660.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      22.2.m72OvSF7e5.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      22.2.m72OvSF7e5.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      22.2.m72OvSF7e5.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 75 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\m72OvSF7e5.exe, ProcessId: 5808, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\m72OvSF7e5.exe' , ParentImage: C:\Users\user\Desktop\m72OvSF7e5.exe, ParentProcessId: 6316, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp', ProcessId: 7104

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "92421eeb-c456-44c2-ab8d-5a66d7e5ab97", "Group": "Company", "Domain1": "194.5.98.202", "Domain2": "", "Port": 4488, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 31%
        Source: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeReversingLabs: Detection: 31%
        Multi AV Scanner detection for submitted fileShow sources
        Source: m72OvSF7e5.exeReversingLabs: Detection: 31%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: m72OvSF7e5.exeJoe Sandbox ML: detected
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 28.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: m72OvSF7e5.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: m72OvSF7e5.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 194.5.98.202
        Source: global trafficTCP traffic: 192.168.2.7:49722 -> 194.5.98.202:4488
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: unknownTCP traffic detected without corresponding DNS query: 194.5.98.202
        Source: m72OvSF7e5.exe, 00000000.00000003.245970853.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: m72OvSF7e5.exe, 00000000.00000002.305822663.0000000003091000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.381501971.0000000003A8D000.00000004.00000001.sdmp, dhcpmon.exe, 00000013.00000002.413950929.0000000002BCD000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: m72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: m72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html4
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248728208.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com%f
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comEacl
        Source: m72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: m72OvSF7e5.exe, 00000000.00000003.248802056.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comWfu
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comaW
        Source: m72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comc
        Source: m72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comdd
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.come
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comicy
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comk
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-uC
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comose
        Source: m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comrose
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comue
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comueu
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: m72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: m72OvSF7e5.exe, 00000000.00000003.255140115.0000000005F6E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: m72OvSF7e5.exe, 00000000.00000003.254576087.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.254558630.0000000005F6E000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: m72OvSF7e5.exe, 00000000.00000003.255198714.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers0.
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: m72OvSF7e5.exe, 00000000.00000003.260543521.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersB
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: m72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersH
        Source: m72OvSF7e5.exe, 00000000.00000003.253911707.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersl
        Source: m72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comiona
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: m72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn(
        Source: m72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: m72OvSF7e5.exe, 00000000.00000003.247848656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/J
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: m72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
        Source: m72OvSF7e5.exe, 00000000.00000003.248605286.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnicro
        Source: m72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnl
        Source: m72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
        Source: m72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnradM
        Source: m72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnskQ
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: m72OvSF7e5.exe, 00000000.00000003.257585115.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: m72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: m72OvSF7e5.exe, 00000000.00000003.257160739.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.:
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.245181004.0000000005F32000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: m72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comw
        Source: m72OvSF7e5.exe, 00000000.00000003.247154026.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: m72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krom
        Source: dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comE
        Source: m72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comicw
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: m72OvSF7e5.exe, 00000000.00000003.255571821.0000000005F57000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
        Source: m72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de)
        Source: m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: m72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dett
        Source: m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn-u
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnicy
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnk
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnr-f6
        Source: m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnw
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.2e09660.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.m72OvSF7e5.exe.2ed95a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_0155C134
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_0155E578
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_0155E56A
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C56010
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C51D7D
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C50040
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C50006
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_087006B0
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_00C766F2
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0177C134
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0177E578
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_0177E569
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_034F4D78
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_034F4D68
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_07836010
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_00DC66F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F696E0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F657F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F657E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F6E828
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_04F6E818
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC6010
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC1D7D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC0040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC0007
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_001C66F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_00A5C134
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_00A5E56A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_00A5E578
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D76010
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D70040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D70006
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D71D7D
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_075E06B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_002766F2
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156FAA0
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156E471
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156E480
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_0156BBD4
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 22_2_00AA66F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_003966F2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_02C7E480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_02C7E471
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_02C7BBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 28_2_00A366F2
        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
        Source: m72OvSF7e5.exe, 00000000.00000000.241760098.0000000000D2E000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.327291621.00000000075F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.328668431.00000000082E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.329514265.00000000083D0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000000.00000002.329514265.00000000083D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 0000000B.00000000.300773783.00000000009BE000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394477156.0000000007870000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394419121.0000000007840000.00000002.00000001.sdmpBinary or memory string: originalfilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394419121.0000000007840000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.395073982.0000000007FE0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.374304037.0000000000E7E000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000011.00000002.394754184.0000000007980000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.391225319.0000000000B5E000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exe, 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exeBinary or memory string: OriginalFilename vs m72OvSF7e5.exe
        Source: m72OvSF7e5.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.2e09660.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.2e09660.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.m72OvSF7e5.exe.2ed95a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.2ed95a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: m72OvSF7e5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: xWdTBYiTWyTud.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.11.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@27/12@0/1
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6112:120:WilError_01
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\gztXuihPvFgNHOAEWZySf
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6548:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5408:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7144:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4696:120:WilError_01
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{92421eeb-c456-44c2-ab8d-5a66d7e5ab97}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Users\user\AppData\Local\Temp\tmp79E0.tmpJump to behavior
        Source: m72OvSF7e5.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: m72OvSF7e5.exeReversingLabs: Detection: 31%
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile read: C:\Users\user\Desktop\m72OvSF7e5.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe 'C:\Users\user\Desktop\m72OvSF7e5.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe C:\Users\user\Desktop\m72OvSF7e5.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: m72OvSF7e5.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: m72OvSF7e5.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: m72OvSF7e5.exe, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: xWdTBYiTWyTud.exe.0.dr, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.m72OvSF7e5.exe.c70000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.m72OvSF7e5.exe.c70000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.11.dr, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.0.m72OvSF7e5.exe.900000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 17.2.m72OvSF7e5.exe.dc0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 17.0.m72OvSF7e5.exe.dc0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 18.0.dhcpmon.exe.1c0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 18.2.dhcpmon.exe.1c0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.dhcpmon.exe.270000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.dhcpmon.exe.270000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.2.m72OvSF7e5.exe.aa0000.1.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.0.m72OvSF7e5.exe.aa0000.0.unpack, Login.cs.Net Code: set_Name System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_07C554C0 push eax; ret
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 0_2_087054BD push FFFFFF8Bh; iretd
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeCode function: 17_2_078354C0 push eax; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC6E8F push es; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5775 push es; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5F18 pushfd ; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC54C0 push eax; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC55C5 push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC555B push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5A67 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_06CC5941 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75775 push es; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D754C0 push eax; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D755C5 push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D7555B push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D76E8E push es; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75F18 pushfd ; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75A66 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06D75941 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_075E54B5 push FFFFFF8Bh; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_075E53BB push dword ptr [ebx+ebp-75h]; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94577186354
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94577186354
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94577186354
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 22.2.m72OvSF7e5.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeJump to dropped file
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeFile opened: C:\Users\user\Desktop\m72OvSF7e5.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeWindow / User API: threadDelayed 4789
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeWindow / User API: threadDelayed 4641
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeWindow / User API: foregroundWindowGot 581
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6352Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6052Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6644Thread sleep time: -13835058055282155s >= -30000s
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 2160Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6680Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2868Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\m72OvSF7e5.exe TID: 6280Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5308Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMemory written: C:\Users\user\Desktop\m72OvSF7e5.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeMemory written: C:\Users\user\Desktop\m72OvSF7e5.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeProcess created: C:\Users\user\Desktop\m72OvSF7e5.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Users\user\Desktop\m72OvSF7e5.exe VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\m72OvSF7e5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: dhcpmon.exe, 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: m72OvSF7e5.exe, 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4608, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m72OvSF7e5.exe PID: 6096, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5724, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 404, type: MEMORY
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec4bed.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ec05c4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4618868.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.4110a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df05c4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41c3888.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.m72OvSF7e5.exe.3ebb78e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3deb78e.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 17.2.m72OvSF7e5.exe.4730f18.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b47be0.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.35b0a38.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.dhcpmon.exe.3df4bed.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.dhcpmon.exe.36c90e8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.m72OvSF7e5.exe.41f64a8.3.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection111Masquerading2Input Capture11Security Software Discovery11Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 357566 Sample: m72OvSF7e5.exe Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Multi AV Scanner detection for dropped file 2->67 69 10 other signatures 2->69 8 m72OvSF7e5.exe 6 2->8         started        12 dhcpmon.exe 4 2->12         started        14 m72OvSF7e5.exe 4 2->14         started        16 dhcpmon.exe 3 2->16         started        process3 file4 55 C:\Users\user\AppData\...\xWdTBYiTWyTud.exe, PE32 8->55 dropped 57 C:\Users\user\AppData\Local\...\tmp79E0.tmp, XML 8->57 dropped 59 C:\Users\user\AppData\...\m72OvSF7e5.exe.log, ASCII 8->59 dropped 73 Injects a PE file into a foreign processes 8->73 18 m72OvSF7e5.exe 1 12 8->18         started        23 schtasks.exe 1 8->23         started        25 schtasks.exe 12->25         started        27 dhcpmon.exe 12->27         started        29 dhcpmon.exe 12->29         started        31 schtasks.exe 14->31         started        33 m72OvSF7e5.exe 14->33         started        signatures5 process6 dnsIp7 61 194.5.98.202, 4488, 49722, 49725 DANILENKODE Netherlands 18->61 49 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->49 dropped 51 C:\Users\user\AppData\Roaming\...\run.dat, data 18->51 dropped 53 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->53 dropped 71 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->71 35 schtasks.exe 1 18->35         started        37 schtasks.exe 1 18->37         started        39 conhost.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 31->43         started        file8 signatures9 process10 process11 45 conhost.exe 35->45         started        47 conhost.exe 37->47         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        m72OvSF7e5.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        m72OvSF7e5.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        22.2.m72OvSF7e5.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://www.urwpp.dett0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.zhongyicts.com.cnr-f60%Avira URL Cloudsafe
        http://www.founder.com.cn/cnskQ0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnicro0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.sandoll.co.krom0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnradM0%Avira URL Cloudsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.tiro.comE0%Avira URL Cloudsafe
        http://www.sakkal.comw0%Avira URL Cloudsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.fontbureau.comiona0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cnht0%Avira URL Cloudsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cnn0%Avira URL Cloudsafe
        http://www.carterandcone.comaW0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.tiro.comicw0%Avira URL Cloudsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.founder.com.cn/cnl0%URL Reputationsafe
        http://www.carterandcone.comue0%Avira URL Cloudsafe
        http://www.ascendercorp.com/typedesigners.html40%Avira URL Cloudsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.urwpp.de)0%Avira URL Cloudsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.carterandcone.comicy0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.urwpp.de0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.zhongyicts.com.cn-u0%Avira URL Cloudsafe
        http://www.zhongyicts.com.cnicy0%Avira URL Cloudsafe
        http://www.carterandcone.come0%URL Reputationsafe
        http://www.carterandcone.come0%URL Reputationsafe
        http://www.carterandcone.come0%URL Reputationsafe
        http://www.carterandcone.comc0%URL Reputationsafe
        http://www.carterandcone.comc0%URL Reputationsafe
        http://www.carterandcone.comc0%URL Reputationsafe
        http://www.carterandcone.comrose0%Avira URL Cloudsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.zhongyicts.com.cnw0%Avira URL Cloudsafe
        http://www.carterandcone.comose0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/J0%Avira URL Cloudsafe
        http://www.carterandcone.comdd0%Avira URL Cloudsafe
        http://www.carterandcone.comn-uC0%Avira URL Cloudsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.comk0%URL Reputationsafe
        http://www.carterandcone.comk0%URL Reputationsafe
        http://www.carterandcone.comk0%URL Reputationsafe
        http://www.zhongyicts.com.cnk0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        194.5.98.202true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersHm72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpfalse
          high
          http://www.urwpp.dettm72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designersGm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnr-f6m72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers?m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersBm72OvSF7e5.exe, 00000000.00000003.260543521.0000000005F4B000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cnskQm72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cnicrom72OvSF7e5.exe, 00000000.00000003.248605286.0000000005F4B000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.comdhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersdhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                    high
                    http://www.sandoll.co.kromm72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnradMm72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers0.m72OvSF7e5.exe, 00000000.00000003.255198714.0000000005F4B000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krm72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248728208.0000000005F4B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comEm72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sakkal.comwm72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comionam72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.245181004.0000000005F32000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnhtm72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.typography.netDm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnnm72OvSF7e5.exe, 00000000.00000003.248268109.0000000005F54000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comaWm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmm72OvSF7e5.exe, 00000000.00000003.257585115.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comm72OvSF7e5.exe, 00000000.00000003.245970853.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comicwm72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designerslm72OvSF7e5.exe, 00000000.00000003.253911707.0000000005F4B000.00000004.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cnlm72OvSF7e5.exe, 00000000.00000003.248011341.0000000005F4B000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comuem72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ascendercorp.com/typedesigners.html4m72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.de)m72OvSF7e5.exe, 00000000.00000003.253091287.0000000005F4B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.ascendercorp.com/typedesigners.htmlm72OvSF7e5.exe, 00000000.00000003.251201016.0000000005F53000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.250673385.0000000005F53000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comicym72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          high
                          http://www.sandoll.co.krm72OvSF7e5.exe, 00000000.00000003.247154026.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.247254700.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleasem72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.dem72OvSF7e5.exe, 00000000.00000003.255571821.0000000005F57000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namem72OvSF7e5.exe, 00000000.00000002.305822663.0000000003091000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.381501971.0000000003A8D000.00000004.00000001.sdmp, dhcpmon.exe, 00000013.00000002.413950929.0000000002BCD000.00000004.00000001.sdmpfalse
                            high
                            http://www.carterandcone.como.m72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn-um72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.305740597.0000000001777000.00000004.00000040.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                high
                                http://www.zhongyicts.com.cnicym72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comem72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comcm72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comrosem72OvSF7e5.exe, 00000000.00000003.248662022.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comTCm72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnwm72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comosem72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/Jm72OvSF7e5.exe, 00000000.00000003.247848656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comddm72OvSF7e5.exe, 00000000.00000003.249104893.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comn-uCm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comlm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comkm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnkm72OvSF7e5.exe, 00000000.00000003.248450656.0000000005F4B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/m72OvSF7e5.exe, 00000000.00000003.247308479.0000000005F4B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnm72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlm72OvSF7e5.exe, 00000000.00000003.254576087.0000000005F4B000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000000.00000003.254558630.0000000005F6E000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/cabarga.htmlm72OvSF7e5.exe, 00000000.00000003.255140115.0000000005F6E000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comEaclm72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers8m72OvSF7e5.exe, 00000000.00000002.326876582.0000000007142000.00000004.00000001.sdmp, m72OvSF7e5.exe, 00000011.00000002.389482810.0000000006270000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.382162455.00000000054F0000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.420285861.00000000055F0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.carterandcone.comWfum72OvSF7e5.exe, 00000000.00000003.248802056.0000000005F4B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comueum72OvSF7e5.exe, 00000000.00000003.249291724.0000000005F4B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.com%fm72OvSF7e5.exe, 00000000.00000003.248981947.0000000005F4B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        http://www.fontbureau.com/designers/m72OvSF7e5.exe, 00000000.00000003.253378838.0000000005F4B000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn(m72OvSF7e5.exe, 00000000.00000003.247627336.0000000005F4B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.monotype.:m72OvSF7e5.exe, 00000000.00000003.257160739.0000000005F4B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          194.5.98.202
                                          unknownNetherlands
                                          208476DANILENKODEtrue

                                          General Information

                                          Joe Sandbox Version:31.0.0 Emerald
                                          Analysis ID:357566
                                          Start date:24.02.2021
                                          Start time:18:38:56
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 13m 52s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:m72OvSF7e5.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:39
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@27/12@0/1
                                          EGA Information:Failed
                                          HDC Information:
                                          • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                          • Quality average: 71.2%
                                          • Quality standard deviation: 36.9%
                                          HCA Information:
                                          • Successful, ratio: 91%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • TCP Packets have been reduced to 100
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/357566/sample/m72OvSF7e5.exe

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          18:40:03API Interceptor697x Sleep call for process: m72OvSF7e5.exe modified
                                          18:40:27Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\m72OvSF7e5.exe" s>$(Arg0)
                                          18:40:27AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                          18:40:31Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                          18:40:36API Interceptor3x Sleep call for process: dhcpmon.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          194.5.98.202V33QokMrIv.exeGet hashmaliciousBrowse
                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse

                                              Domains

                                              No context

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              DANILENKODEneue bestellung.PDF.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              Eingang.Jpg.exeGet hashmaliciousBrowse
                                              • 194.5.97.116
                                              V33QokMrIv.exeGet hashmaliciousBrowse
                                              • 194.5.98.202
                                              3Fv4j323nj.exeGet hashmaliciousBrowse
                                              • 194.5.98.182
                                              scan09e8902093922023ce.exeGet hashmaliciousBrowse
                                              • 194.5.98.46
                                              PO AAN2102002-V020.docGet hashmaliciousBrowse
                                              • 194.5.98.182
                                              DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                              • 194.5.98.202
                                              neue bestellung.PDF.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              Orderoffer.exeGet hashmaliciousBrowse
                                              • 194.5.98.66
                                              neue bestellung.PDF.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              OrderSuppliesQuote0817916.exeGet hashmaliciousBrowse
                                              • 194.5.97.248
                                              DHL_6368638172 documento de recibo,pdf.exeGet hashmaliciousBrowse
                                              • 194.5.97.244
                                              QuotationInvoices.exeGet hashmaliciousBrowse
                                              • 194.5.97.248
                                              PAYMENT_.EXEGet hashmaliciousBrowse
                                              • 194.5.98.211
                                              payment.exeGet hashmaliciousBrowse
                                              • 194.5.98.66
                                              RFQ_1101983736366355 1101938377388.exeGet hashmaliciousBrowse
                                              • 194.5.98.21
                                              Slip copy .xls.exeGet hashmaliciousBrowse
                                              • 194.5.97.116
                                              Scan0059.pdf.exeGet hashmaliciousBrowse
                                              • 194.5.97.34
                                              DHL AWB # 6008824216.png.exeGet hashmaliciousBrowse
                                              • 194.5.97.48
                                              Scan0019.exeGet hashmaliciousBrowse
                                              • 194.5.97.34

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exeDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse

                                                  Created / dropped Files

                                                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):766976
                                                  Entropy (8bit):7.940274777998683
                                                  Encrypted:false
                                                  SSDEEP:12288:sEoF4lSePJI+f8Y+6I7MoPrYeAZDGfQ0lSzujpMEOoeYw3LLUEMthvoPTG16KL:GYPJnf876I7KTZDYizutM3oeLCsG16KL
                                                  MD5:8C596990203F7D15651498FDBA84B5F3
                                                  SHA1:BCABAE5C0B3CA8E9558AD3F57C3A10E8B5AE6F74
                                                  SHA-256:A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
                                                  SHA-512:1CBC6440FE45B66E5A72A41312B1195E25B64EDE5F97BFDE98CD9FDCABE30C9434FCEED40282D2453B7B25823AAEF7CB26F4D910E1EBA6FB95FB2A83D3968D93
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 31%
                                                  Joe Sandbox View:
                                                  • Filename: DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.doc, Detection: malicious, Browse
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5`..............0.................. ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Ho..p3......4........%..........................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....r!..p~....o......t.....+..*....0..!........(....r1..p~....o......t.....+..*....0...........r5..p.+..*..0...........rA..p.+..*".(.....*^..}.....(.......(%....**...(.....*..0..;........rQ..pr...p.(...........,..(......+..s......o .....(!.....*..0..I........r...pr...p.(.......
                                                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Preview: [ZoneTransfer]....ZoneId=0
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                  Malicious:false
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\m72OvSF7e5.exe.log
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                  Malicious:true
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp
                                                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1662
                                                  Entropy (8bit):5.176206395814203
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3E
                                                  MD5:0ED283E09C831888474411E9B6B1CA70
                                                  SHA1:5D3E96B7D4E39DDE90DEE567170FA04D28F5BBE7
                                                  SHA-256:1DAC39E417775EC539C9953DFB013CAEFC1B76C78D5C989E71F16F60192ECD8D
                                                  SHA-512:6F3182A1BB764DBB319165124A640083BD0CE255F32E664B905528F52106D8018E73924EB032C0EE59EF01D37EA331123F38C13281471FD1DB29CB678BB8CDAE
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                  C:\Users\user\AppData\Local\Temp\tmp79E0.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1662
                                                  Entropy (8bit):5.176206395814203
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3E
                                                  MD5:0ED283E09C831888474411E9B6B1CA70
                                                  SHA1:5D3E96B7D4E39DDE90DEE567170FA04D28F5BBE7
                                                  SHA-256:1DAC39E417775EC539C9953DFB013CAEFC1B76C78D5C989E71F16F60192ECD8D
                                                  SHA-512:6F3182A1BB764DBB319165124A640083BD0CE255F32E664B905528F52106D8018E73924EB032C0EE59EF01D37EA331123F38C13281471FD1DB29CB678BB8CDAE
                                                  Malicious:true
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                  C:\Users\user\AppData\Local\Temp\tmp84A.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1304
                                                  Entropy (8bit):5.111047452277609
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Mxtn:cbk4oL600QydbQxIYODOLedq3fj
                                                  MD5:3B021150D732CE9C1B83583CBBAB65B0
                                                  SHA1:7AB50F74F9379D2CE4F71ABE69DB6318A81E3E59
                                                  SHA-256:BFFB90288DD6A2FC0FAFEDB06DEFEDA15979230733F2FD9A77ABFD4B1AF44F8A
                                                  SHA-512:ECB490FB065A9D7C53F8B8E3735900D61CDBCD5A5229AEDC6582EBC4ED600E4D6FE8A01156CE91A27E2C9FDEA692156162D3CD3F6709657177E9EF651C3E0BAE
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                  C:\Users\user\AppData\Local\Temp\tmpE27.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1310
                                                  Entropy (8bit):5.109425792877704
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                  MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                  SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                  SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                  SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                  C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1662
                                                  Entropy (8bit):5.176206395814203
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBUtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3E
                                                  MD5:0ED283E09C831888474411E9B6B1CA70
                                                  SHA1:5D3E96B7D4E39DDE90DEE567170FA04D28F5BBE7
                                                  SHA-256:1DAC39E417775EC539C9953DFB013CAEFC1B76C78D5C989E71F16F60192ECD8D
                                                  SHA-512:6F3182A1BB764DBB319165124A640083BD0CE255F32E664B905528F52106D8018E73924EB032C0EE59EF01D37EA331123F38C13281471FD1DB29CB678BB8CDAE
                                                  Malicious:false
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):3.0
                                                  Encrypted:false
                                                  SSDEEP:3:wlm:wM
                                                  MD5:A09BECF4F09438D33917C5B8E0D8665A
                                                  SHA1:6E189F54EFF9747C8C4294B84390CEE3FAFB27D6
                                                  SHA-256:0B2B27FDB63119E3504818C3A080F5499F69F9B67673C9E1B06365EA5A25E73E
                                                  SHA-512:1C913FD38916398CF4FD0652169E91927ABDDBCB9B2D31A9B59D0D7D22A63C9F5C204139602D4F79D3A2715242521FA2EAB9B132DA51D30485DEA861E55C08DF
                                                  Malicious:true
                                                  Preview: ....6..H
                                                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):41
                                                  Entropy (8bit):4.345118467927183
                                                  Encrypted:false
                                                  SSDEEP:3:oN0naRRIuA:oNcSRIuA
                                                  MD5:CAA1DF014F8918E60F42746A155DABF8
                                                  SHA1:AC61D00144FE9F813FF1E5F91E2E5C738319FE73
                                                  SHA-256:C7A609BA17D183FFAABDAA9A6F28270D508CDE2A09ABD99EE1CD3E60382A3240
                                                  SHA-512:024D7F902A8D2B49B481BA11C428BD3EF9065A11397585626EA2D1D0F4C4DED093B01D1E22DCDCEFC155769BA57A78FD461E6A98E8E4FC15CF05349BFDA0B2BF
                                                  Malicious:false
                                                  Preview: C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  C:\Users\user\AppData\Roaming\xWdTBYiTWyTud.exe
                                                  Process:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):766976
                                                  Entropy (8bit):7.940274777998683
                                                  Encrypted:false
                                                  SSDEEP:12288:sEoF4lSePJI+f8Y+6I7MoPrYeAZDGfQ0lSzujpMEOoeYw3LLUEMthvoPTG16KL:GYPJnf876I7KTZDYizutM3oeLCsG16KL
                                                  MD5:8C596990203F7D15651498FDBA84B5F3
                                                  SHA1:BCABAE5C0B3CA8E9558AD3F57C3A10E8B5AE6F74
                                                  SHA-256:A98A739B9AB7B06BF2833F6EF4AA97DB1B7C2441365C7104E878C8B29BF90F74
                                                  SHA-512:1CBC6440FE45B66E5A72A41312B1195E25B64EDE5F97BFDE98CD9FDCABE30C9434FCEED40282D2453B7B25823AAEF7CB26F4D910E1EBA6FB95FB2A83D3968D93
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 31%
                                                  Joe Sandbox View:
                                                  • Filename: DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.doc, Detection: malicious, Browse
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5`..............0.................. ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Ho..p3......4........%..........................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....r!..p~....o......t.....+..*....0..!........(....r1..p~....o......t.....+..*....0...........r5..p.+..*..0...........rA..p.+..*".(.....*^..}.....(.......(%....**...(.....*..0..;........rQ..pr...p.(...........,..(......+..s......o .....(!.....*..0..I........r...pr...p.(.......

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.940274777998683
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:m72OvSF7e5.exe
                                                  File size:766976
                                                  MD5:8c596990203f7d15651498fdba84b5f3
                                                  SHA1:bcabae5c0b3ca8e9558ad3f57c3a10e8b5ae6f74
                                                  SHA256:a98a739b9ab7b06bf2833f6ef4aa97db1b7c2441365c7104e878c8b29bf90f74
                                                  SHA512:1cbc6440fe45b66e5a72a41312b1195e25b64ede5f97bfde98cd9fdcabe30c9434fceed40282d2453b7b25823aaef7cb26f4d910e1eba6fb95fb2a83d3968d93
                                                  SSDEEP:12288:sEoF4lSePJI+f8Y+6I7MoPrYeAZDGfQ0lSzujpMEOoeYw3LLUEMthvoPTG16KL:GYPJnf876I7KTZDYizutM3oeLCsG16KL
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5`..............0.................. ........@.. ....................... ............@................................

                                                  File Icon

                                                  Icon Hash:00828e8e8686b000

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x4bc80a
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x6035D91A [Wed Feb 24 04:42:02 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbc7b80x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x5b4.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xba8100xbaa00False0.932769591427data7.94577186354IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xbe0000x5b40x600False0.432942708333data4.21052745269IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xc00000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xbe0900x324data
                                                  RT_MANIFEST0xbe3c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2016
                                                  Assembly Version4.0.0.0
                                                  InternalNameTGk5J.exe
                                                  FileVersion4.0.0.0
                                                  CompanyName
                                                  LegalTrademarks
                                                  Comments
                                                  ProductNameITP_RMSS
                                                  ProductVersion4.0.0.0
                                                  FileDescriptionITP_RMSS
                                                  OriginalFilenameTGk5J.exe

                                                  Network Behavior

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Feb 24, 2021 18:40:31.957748890 CET497224488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:32.234703064 CET448849722194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:32.763605118 CET497224488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:33.066901922 CET448849722194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:33.654454947 CET497224488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:34.105788946 CET448849722194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:38.740267992 CET497254488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:39.021805048 CET448849725194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:39.686141014 CET497254488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:39.966897011 CET448849725194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:40.483031034 CET497254488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:40.766974926 CET448849725194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:46.861275911 CET497284488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:47.131726027 CET448849728194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:47.655553102 CET497284488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:47.930370092 CET448849728194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:48.561847925 CET497284488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:48.831370115 CET448849728194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:54.363543987 CET497294488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:54.641540051 CET448849729194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:55.187378883 CET497294488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:55.465792894 CET448849729194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:40:55.984328032 CET497294488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:40:56.256597042 CET448849729194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:00.267158985 CET497304488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:00.547666073 CET448849730194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:01.187942028 CET497304488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:01.488466978 CET448849730194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:02.136231899 CET497304488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:02.431296110 CET448849730194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:06.447145939 CET497364488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:06.725570917 CET448849736194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:07.266489029 CET497364488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:07.545663118 CET448849736194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:08.157237053 CET497364488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:08.426438093 CET448849736194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:12.549977064 CET497374488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:12.818486929 CET448849737194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:13.329555035 CET497374488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:13.609318018 CET448849737194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:14.127358913 CET497374488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:14.393717051 CET448849737194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:18.433444977 CET497384488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:18.716609955 CET448849738194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:19.221802950 CET497384488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:19.501626968 CET448849738194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:20.006016016 CET497384488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:20.287722111 CET448849738194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:24.374414921 CET497394488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:24.666488886 CET448849739194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:25.174283981 CET497394488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:25.456455946 CET448849739194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:25.971285105 CET497394488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:26.269743919 CET448849739194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:30.285620928 CET497404488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:30.551568985 CET448849740194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:31.065418959 CET497404488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:31.341623068 CET448849740194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:31.846676111 CET497404488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:32.120675087 CET448849740194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:36.130944014 CET497424488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:36.407356977 CET448849742194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:36.909609079 CET497424488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:37.216361046 CET448849742194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:37.722147942 CET497424488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:38.044959068 CET448849742194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:42.052165985 CET497434488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:42.336393118 CET448849743194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:42.847588062 CET497434488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:43.128284931 CET448849743194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:43.628968000 CET497434488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:43.920660019 CET448849743194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:47.927405119 CET497444488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:50.942068100 CET497444488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:51.221467018 CET448849744194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:51.723417044 CET497444488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:51.996634960 CET448849744194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:56.006624937 CET497504488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:56.276757002 CET448849750194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:56.786268950 CET497504488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:57.055735111 CET448849750194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:41:57.567692041 CET497504488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:41:57.841870070 CET448849750194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:01.884973049 CET497544488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:02.181546926 CET448849754194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:02.724307060 CET497544488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:03.006623030 CET448849754194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:03.521239042 CET497544488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:03.801537991 CET448849754194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:07.842608929 CET497554488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:08.130831003 CET448849755194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:08.740433931 CET497554488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:09.056885004 CET448849755194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:09.742245913 CET497554488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:10.026472092 CET448849755194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:14.089448929 CET497564488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:14.360654116 CET448849756194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:14.912879944 CET497564488192.168.2.7194.5.98.202
                                                  Feb 24, 2021 18:42:15.185463905 CET448849756194.5.98.202192.168.2.7
                                                  Feb 24, 2021 18:42:15.725471973 CET497564488192.168.2.7194.5.98.202

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:18:39:53
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\m72OvSF7e5.exe'
                                                  Imagebase:0xc70000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.309611902.0000000004099000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:19
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp79E0.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:20
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:20
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0x900000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:25
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp84A.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:25
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:26
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpE27.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:27
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:28
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\Desktop\m72OvSF7e5.exe 0
                                                  Imagebase:0xdc0000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.383577417.0000000004539000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:31
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                  Imagebase:0x1c0000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.372726436.0000000003539000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 31%, ReversingLabs
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:35
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                  Imagebase:0x270000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.416135404.0000000003B47000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:18:40:52
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmpF7E9.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:52
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:18:40:53
                                                  Start date:24/02/2021
                                                  Path:C:\Users\user\Desktop\m72OvSF7e5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0xaa0000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.392744009.0000000002E71000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.390672514.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.392926615.0000000003E79000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                  General

                                                  Start time:18:41:06
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\xWdTBYiTWyTud' /XML 'C:\Users\user\AppData\Local\Temp\tmp2CE4.tmp'
                                                  Imagebase:0x8f0000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:18:41:08
                                                  Start date:24/02/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff774ee0000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:18:41:09
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:{path}
                                                  Imagebase:0x390000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language

                                                  General

                                                  Start time:18:41:09
                                                  Start date:24/02/2021
                                                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0xa30000
                                                  File size:766976 bytes
                                                  MD5 hash:8C596990203F7D15651498FDBA84B5F3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.427245821.0000000003DA9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.427149067.0000000002DA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.425873498.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >