Loading ...

Play interactive tourEdit tour

Analysis Report bbbe7872ea466446da60c4da50020cbb.exe

Overview

General Information

Sample Name:bbbe7872ea466446da60c4da50020cbb.exe
Analysis ID:358272
MD5:88ef84e623f21af8c30d3bba321a7448
SHA1:701339b101c76fa1ba159c66b48ef2f9b6d73aa8
SHA256:0095c39f2d6f62dea9fd6d066decab6f0a7acab87829f659efd01bc1d2564bd0
Tags:exeNanoCorenVpnRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • bbbe7872ea466446da60c4da50020cbb.exe (PID: 6780 cmdline: 'C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe' MD5: 88EF84E623F21AF8C30D3BBA321A7448)
    • bbbe7872ea466446da60c4da50020cbb.exe (PID: 6996 cmdline: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe MD5: 88EF84E623F21AF8C30D3BBA321A7448)
      • schtasks.exe (PID: 7072 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 7080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 7124 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp81B3.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 7132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5656 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 88EF84E623F21AF8C30D3BBA321A7448)
    • dhcpmon.exe (PID: 6240 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 88EF84E623F21AF8C30D3BBA321A7448)
    • dhcpmon.exe (PID: 6332 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 88EF84E623F21AF8C30D3BBA321A7448)
  • dhcpmon.exe (PID: 6084 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 88EF84E623F21AF8C30D3BBA321A7448)
    • dhcpmon.exe (PID: 6340 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 88EF84E623F21AF8C30D3BBA321A7448)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "94----", "Group": "V-HASH", "Domain1": "cloudhost.myfirewall.org", "Domain2": "cloudhost.myfirewall.org", "Port": 5654, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "cloudhost.myfirewall.org", "BackupDNSServer": "cloudhost.myfirewall.org", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x49a5d:$a: NanoCore
      • 0x49ab6:$a: NanoCore
      • 0x49af3:$a: NanoCore
      • 0x49b6c:$a: NanoCore
      • 0x5d217:$a: NanoCore
      • 0x5d22c:$a: NanoCore
      • 0x5d261:$a: NanoCore
      • 0x76233:$a: NanoCore
      • 0x76248:$a: NanoCore
      • 0x7627d:$a: NanoCore
      • 0x49abf:$b: ClientPlugin
      • 0x49afc:$b: ClientPlugin
      • 0x4a3fa:$b: ClientPlugin
      • 0x4a407:$b: ClientPlugin
      • 0x5cfd3:$b: ClientPlugin
      • 0x5cfee:$b: ClientPlugin
      • 0x5d01e:$b: ClientPlugin
      • 0x5d235:$b: ClientPlugin
      • 0x5d26a:$b: ClientPlugin
      • 0x75fef:$b: ClientPlugin
      • 0x7600a:$b: ClientPlugin
      Click to see the 53 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      16.2.dhcpmon.exe.40530dd.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0x241a0:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      • 0x241cd:$x2: IClientNetworkHost
      16.2.dhcpmon.exe.40530dd.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0x241a0:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0x2527b:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      • 0x241ba:$s5: IClientLoggingHost
      16.2.dhcpmon.exe.40530dd.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        14.2.dhcpmon.exe.2d53ac8.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        14.2.dhcpmon.exe.2d53ac8.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 131 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe, ProcessId: 6996, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe, ParentImage: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe, ParentProcessId: 6996, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp', ProcessId: 7072

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "94----", "Group": "V-HASH", "Domain1": "cloudhost.myfirewall.org", "Domain2": "cloudhost.myfirewall.org", "Port": 5654, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "cloudhost.myfirewall.org", "BackupDNSServer": "cloudhost.myfirewall.org", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 34%
        Multi AV Scanner detection for submitted fileShow sources
        Source: bbbe7872ea466446da60c4da50020cbb.exeReversingLabs: Detection: 34%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORY
        Source: Yara matchFile source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: bbbe7872ea466446da60c4da50020cbb.exeJoe Sandbox ML: detected
        Source: 14.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 16.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Uses new MSVCR DllsShow sources
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: mscorrc.pdb source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348914863.0000000008030000.00000002.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.369455397.0000000007BC0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.372863219.0000000007CF0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.386840376.0000000007650000.00000002.00000001.sdmp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: cloudhost.myfirewall.org
        Source: global trafficTCP traffic: 192.168.2.6:49712 -> 79.134.225.105:5654
        Source: Joe Sandbox ViewIP Address: 79.134.225.105 79.134.225.105
        Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
        Source: unknownDNS traffic detected: queries for: cloudhost.myfirewall.org
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.325630674.00000000051A9000.00000004.00000001.sdmpString found in binary or memory: http://en.w
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: dhcpmon.exe, dhcpmon.exe, 0000000E.00000002.378594437.0000000000502000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.371490717.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 00000010.00000002.390560823.00000000008F2000.00000002.00020000.sdmp, bbbe7872ea466446da60c4da50020cbb.exeString found in binary or memory: http://inchat.kro.kr
        Source: dhcpmon.exe, dhcpmon.exe, 0000000E.00000002.378594437.0000000000502000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.371490717.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 00000010.00000002.390560823.00000000008F2000.00000002.00020000.sdmp, bbbe7872ea466446da60c4da50020cbb.exeString found in binary or memory: http://schooldb.inchat.kro.kr/
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.330244134.00000000051DD000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329135863.00000000051A7000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329135863.00000000051A7000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com&
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com.
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTCw
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comormD
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.333166545.00000000051D5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.333166545.00000000051D5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlo
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.332711004.00000000051D5000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.327774459.00000000051AB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: dhcpmon.exe, dhcpmon.exe, 0000000E.00000002.378594437.0000000000502000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.371490717.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 00000010.00000002.390560823.00000000008F2000.00000002.00020000.sdmp, bbbe7872ea466446da60c4da50020cbb.exeString found in binary or memory: http://www.gagalive.kr/livechat1.swf?chatroom=inchat-
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.334789389.00000000051D5000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/(
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/D
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vvT
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnp
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORY
        Source: Yara matchFile source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.dhcpmon.exe.2d53ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.2dc3b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.2cd1690.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 16.2.dhcpmon.exe.3023ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large stringsShow sources
        Source: bbbe7872ea466446da60c4da50020cbb.exe, frmLogin.csLong String: Length: 13656
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.590000.0.unpack, frmLogin.csLong String: Length: 13656
        Source: 0.0.bbbe7872ea466446da60c4da50020cbb.exe.590000.0.unpack, frmLogin.csLong String: Length: 13656
        Source: dhcpmon.exe.4.dr, frmLogin.csLong String: Length: 13656
        Source: 4.0.bbbe7872ea466446da60c4da50020cbb.exe.620000.0.unpack, frmLogin.csLong String: Length: 13656
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.620000.1.unpack, frmLogin.csLong String: Length: 13656
        Source: 10.0.bbbe7872ea466446da60c4da50020cbb.exe.720000.0.unpack, frmLogin.csLong String: Length: 13656
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.720000.0.unpack, frmLogin.csLong String: Length: 13656
        Source: 11.2.dhcpmon.exe.720000.0.unpack, frmLogin.csLong String: Length: 13656
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_0059AC81
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F052D8
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F04890
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F04688
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F052C8
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F04678
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F0C198
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_0059AF8E
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_0062AC81
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_01117AC1
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_0062AF8E
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_0072AC81
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_01072E09
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_02964890
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_02964688
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_029652D8
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_02964880
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_029652C8
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_02964678
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_0296C198
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_0072AF8E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00EC2E09
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B04890
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B04688
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B052D8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B052C8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B04678
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B0C198
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 12_2_0079AC81
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 12_2_04FD2FA8
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 12_2_04FD23A0
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 12_2_04FD3850
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 12_2_04FD306F
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 12_2_0079AF8E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_001FAC81
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_001FAF8E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_0050AC81
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_04D423A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_04D42FA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_04D43850
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_04D4306F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_0050AF8E
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.342613471.000000000060A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSystemLazyDebugView.exe. vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348914863.0000000008030000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.349527090.00000000081F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000000.340812552.000000000069A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSystemLazyDebugView.exe. vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000000.350174572.000000000079A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSystemLazyDebugView.exe. vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.370141196.0000000007D70000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.369455397.0000000007BC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000000.353961165.000000000080A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSystemLazyDebugView.exe. vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000002.378738155.00000000050F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exeBinary or memory string: OriginalFilenameSystemLazyDebugView.exe. vs bbbe7872ea466446da60c4da50020cbb.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.dhcpmon.exe.2d53ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.dhcpmon.exe.2d53ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.2dc3b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.2dc3b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.2cd1690.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.2cd1690.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 16.2.dhcpmon.exe.3023ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 16.2.dhcpmon.exe.3023ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: bbbe7872ea466446da60c4da50020cbb.exe, frmLogin.csBase64 encoded string: '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
        Source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.590000.0.unpack, frmLogin.csBase64 encoded string: 'GIdDNNZNNNNRNNNN//8NNYtNNNNNNNNNDNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNtNNNNN4sht4NgNaAVotOGZ0uITucplOjpz9apzSgVTAuoz5iqPOvMFOlqJ4tnJ4tER9GVT1iMTHhQD0XWNNNNNNNNNODEDNNGNRQNViu868NNNNNNNNNNBNNNvRYNINNNPNNNNNTNNNNNNNNlw8NNNNtNNNNDNNNNNNNRDNtNNNNNtNNONNNNNNNNNNRNNNNNNNNNNPNNNNNNtNNNNNNNNZNDVHNNONNNONNNNNNRNNNRNNNNNNNNONNNNNNNNNNNNNNNUt/NNOCNNNNNRNNNBDQNNNNNNNNNNNNNNNNNNNNNNNNNTNNNNjNNNOpCjNNUNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNVNNNPNNNNNNNNNNNNNNNPPNNNRtNNNNNNNNNNNNNNP50MKu0NNNN0O8NNNNtNNNNVNNNNNVNNNNNNNNNNNNNNNNNNPNNNTNhpaAlLjNNNBDQNNNNDNNNNNDNNNNvNNNNNNNNNNNNNNNNNNONNNONYaWyoT9wNNNZNNNNNTNNNNNPNNNNWtNNNNNNNNNNNNNNNNNNDNNNDtNNNNNNNNNNNNNNNNNNNNPfCjNNNNNNNRtNNNNPNNHNhPHNNBjLNNNQNNNNNNNNNXD+NNP4NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNO4PXOLNNNbdWtNPXOpNNNbNXdMmTNNNPbNONNNRpkxNNNdNNtNNOUZnNNNXtNZNNNEmTjNNPbNRNNNRXuZjNDNDNNNNNDNNRDO+NDNNOT8pNNNXPvfNOvbGZNRNRNNNNNVNNORNstVNNNEiUDNNPtbeNNLdRmNONONNNNNQNNNENU4QNNNRok4NNNbXXjNTXuZjNDNDNNNNONNNRDO+ONNNOT8sNNNXPvfNOvbGZNVNCNNNNNHNNORNstHNNNDHXPNNNNbYOljuptRNNUQDODNNNvtuNNNXolVNNNcmVjNNPtjVtNHNNNDNNU4SNNNRPvfNOvbGZNRNPjNNNNLNNORNstLNNNDXXjNTXvVNNbNTNNNRXyMmQNNNOvtxNNNXqNLNNNXNOjNNOPbrNvtyNNNXXtNNRmNONNfNNNNUNNNENU4UNNNRPvfNOvbNRmNONNfNNNNUNNNENPtANNNTPvfNOvc+pwfNNUPNPNNNOUV7NNOjtNxNNNElBjNNpVNXNNNRXxbNNvtzNNNXNNZROFtENNNTNPbNNOZjONO0NNNNPNNNRDOmWjNNPtbTVYvPNDNtXWbONT8bNNNXXPxNNNbNNvtINNNTOPtHNNNTPjpbRjNNOtZbSDNNOvtFNNNTQNtbXtNNPt0WolfNNNbqzuZRRDEiYNNNPuhnRjHEOKV9NNOjTOvAStNNNFtgNNNXWuLbYtNNPtNdRmNSNWpNNNNWNNNENPtiNNNXN28jNNNXPjVPwzxK2cRspTRZNb5cS9LK2usJwF8NNNRANb5cS9bGOORRRjHJRjLeBtxEOtVEOcRVLDpEO5SugWjEOjAiZDNNPusn/tRGPORVRjxEPFjTSuZUNPfVNORUS9LGOjNEOusJRjLEOuRSZpNWNb5cTAbK1usnS9nAYjNNNFtlNNNXqNHNNOfXXjNTXtNGZNHNctNNNNbNNORNStfPomZNNNbGOkVUXQDNNNbZPNwLTgtAPEsnS9nAYjNNNEZRPOsnRjtJRjxeDjtK2uZXSuZYXl0PRDxEP281NNNXRjjFQPt2NNNXXQpNNNbJRDDUTvt4NNNXNNpn1tfEPksJRjfEPkRXZp0EPEsJRjxEPERVZopEOOLbBDNNPuZSRDHK2usJwF8NNNRGOuRRTuRTSuRTwzxbBNNNPtNEOtbeNNLdNNNGZNVNXNNNNNfNNORNN3WYNNOjXQbNNNbbBjNNPaZwNNNXPjpPomjNNNc0VtNNNDbeNNLdRmNRNRbNNNNZNNNENNWiZDNNPuuopm0NNNbYNz8kNNNXTAbZSt0eUjpPPEuiCtNNPu8DXQ8NNNbbDNNNPz9ONNNXWtxL1t0WPQUqO29PNNNXPvfNOvbNNOZjNDNUNNNNQDNNRDNHPvfNOvcTNNVJztVKztVLzvtENNNTNPbNNNNGZNZNVNNNNN4NNORNsttNNNE+PDNNOU4XNNNRXORNNNLNpwfNNUNXXjNTXuZjNtNFNNNNQjNNRDNPNluQNNNXXRDNNNbXXjNTXtNNRmNONNjNNNNDNNNENNVbEDNNPtbeNNLdRmNONONNNNNENNNENANWNNNPXPRNNNbXXjNTXuZjNDNZNNNNQtNNRDNPXRLNNNbXXjNTXuZjNtNqNNNNRtNNRDNPwNLNNOfH/tRYOljVXNRNNPfXXjHNNtbeNNLdWtNQ/uHTNNNoXvLNNvtzNNNXNPbNNNNGZNVNADNNNOZNNORNNagVNNNXo0xNNNbYO4jWNNNoSC4OQNtfSPtPNNNePjW7FNNNPtqiFtNNPtNNNNpXXjNTXyVNNvtzNNNXNNWmFjNNPa1VNNNXXv4bTNNNObNZNNNRXu4PXPLNNNbdNNOPH0cPNDNONNNNNNNZNNNNqwVhZP41ZQplAjNNNNNSNTjNNNPbPDNNV34NNODXNNOjPDNNV1A0pzyhM3ZNNNNNuOZNNTDNNNNwIIZN6OZNNONNNNNwE1IWENNNNCtGNNQ0ONNNV0Wfo2VNNNNNNNNNNtNNNIpIbtxWQjNNNCbOZjNJNNNONNNNBDNNNNfNNNNZNNNNVjNNNORNNNOYNNNNCjNNNOZNNNNTNNNNPtNNNNjNNNNWNNNNNDNNNNDNNNNONNNNNjNNNNZNNNNPNNNNNNNZODRNNNNNNNLNdtBJOjLNSjFJOjLNztYZOt8NQttNNNLN2jXzODLNwDBzODLN/tBzODLNltBzODLN4jBzODL
        Source: 0.0.bbbe7872ea466446da60c4da50020cbb.exe.590000.0.unpack, frmLogin.csBase64 encoded string: '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
        Source: dhcpmon.exe.4.dr, frmLogin.csBase64 encoded string: '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
        Source: 4.0.bbbe7872ea466446da60c4da50020cbb.exe.620000.0.unpack, frmLogin.csBase64 encoded string: 'GIdDNNZNNNNRNNNN//8NNYtNNNNNNNNNDNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNtNNNNN4sht4NgNaAVotOGZ0uITucplOjpz9apzSgVTAuoz5iqPOvMFOlqJ4tnJ4tER9GVT1iMTHhQD0XWNNNNNNNNNODEDNNGNRQNViu868NNNNNNNNNNBNNNvRYNINNNPNNNNNTNNNNNNNNlw8NNNNtNNNNDNNNNNNNRDNtNNNNNtNNONNNNNNNNNNRNNNNNNNNNNPNNNNNNtNNNNNNNNZNDVHNNONNNONNNNNNRNNNRNNNNNNNNONNNNNNNNNNNNNNNUt/NNOCNNNNNRNNNBDQNNNNNNNNNNNNNNNNNNNNNNNNNTNNNNjNNNOpCjNNUNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNVNNNPNNNNNNNNNNNNNNNPPNNNRtNNNNNNNNNNNNNNP50MKu0NNNN0O8NNNNtNNNNVNNNNNVNNNNNNNNNNNNNNNNNNPNNNTNhpaAlLjNNNBDQNNNNDNNNNNDNNNNvNNNNNNNNNNNNNNNNNNONNNONYaWyoT9wNNNZNNNNNTNNNNNPNNNNWtNNNNNNNNNNNNNNNNNNDNNNDtNNNNNNNNNNNNNNNNNNNNPfCjNNNNNNNRtNNNNPNNHNhPHNNBjLNNNQNNNNNNNNNXD+NNP4NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNO4PXOLNNNbdWtNPXOpNNNbNXdMmTNNNPbNONNNRpkxNNNdNNtNNOUZnNNNXtNZNNNEmTjNNPbNRNNNRXuZjNDNDNNNNNDNNRDO+NDNNOT8pNNNXPvfNOvbGZNRNRNNNNNVNNORNstVNNNEiUDNNPtbeNNLdRmNONONNNNNQNNNENU4QNNNRok4NNNbXXjNTXuZjNDNDNNNNONNNRDO+ONNNOT8sNNNXPvfNOvbGZNVNCNNNNNHNNORNstHNNNDHXPNNNNbYOljuptRNNUQDODNNNvtuNNNXolVNNNcmVjNNPtjVtNHNNNDNNU4SNNNRPvfNOvbGZNRNPjNNNNLNNORNstLNNNDXXjNTXvVNNbNTNNNRXyMmQNNNOvtxNNNXqNLNNNXNOjNNOPbrNvtyNNNXXtNNRmNONNfNNNNUNNNENU4UNNNRPvfNOvbNRmNONNfNNNNUNNNENPtANNNTPvfNOvc+pwfNNUPNPNNNOUV7NNOjtNxNNNElBjNNpVNXNNNRXxbNNvtzNNNXNNZROFtENNNTNPbNNOZjONO0NNNNPNNNRDOmWjNNPtbTVYvPNDNtXWbONT8bNNNXXPxNNNbNNvtINNNTOPtHNNNTPjpbRjNNOtZbSDNNOvtFNNNTQNtbXtNNPt0WolfNNNbqzuZRRDEiYNNNPuhnRjHEOKV9NNOjTOvAStNNNFtgNNNXWuLbYtNNPtNdRmNSNWpNNNNWNNNENPtiNNNXN28jNNNXPjVPwzxK2cRspTRZNb5cS9LK2usJwF8NNNRANb5cS9bGOORRRjHJRjLeBtxEOtVEOcRVLDpEO5SugWjEOjAiZDNNPusn/tRGPORVRjxEPFjTSuZUNPfVNORUS9LGOjNEOusJRjLEOuRSZpNWNb5cTAbK1usnS9nAYjNNNFtlNNNXqNHNNOfXXjNTXtNGZNHNctNNNNbNNORNStfPomZNNNbGOkVUXQDNNNbZPNwLTgtAPEsnS9nAYjNNNEZRPOsnRjtJRjxeDjtK2uZXSuZYXl0PRDxEP281NNNXRjjFQPt2NNNXXQpNNNbJRDDUTvt4NNNXNNpn1tfEPksJRjfEPkRXZp0EPEsJRjxEPERVZopEOOLbBDNNPuZSRDHK2usJwF8NNNRGOuRRTuRTSuRTwzxbBNNNPtNEOtbeNNLdNNNGZNVNXNNNNNfNNORNN3WYNNOjXQbNNNbbBjNNPaZwNNNXPjpPomjNNNc0VtNNNDbeNNLdRmNRNRbNNNNZNNNENNWiZDNNPuuopm0NNNbYNz8kNNNXTAbZSt0eUjpPPEuiCtNNPu8DXQ8NNNbbDNNNPz9ONNNXWtxL1t0WPQUqO29PNNNXPvfNOvbNNOZjNDNUNNNNQDNNRDNHPvfNOvcTNNVJztVKztVLzvtENNNTNPbNNNNGZNZNVNNNNN4NNORNsttNNNE+PDNNOU4XNNNRXORNNNLNpwfNNUNXXjNTXuZjNtNFNNNNQjNNRDNPNluQNNNXXRDNNNbXXjNTXtNNRmNONNjNNNNDNNNENNVbEDNNPtbeNNLdRmNONONNNNNENNNENANWNNNPXPRNNNbXXjNTXuZjNDNZNNNNQtNNRDNPXRLNNNbXXjNTXuZjNtNqNNNNRtNNRDNPwNLNNOfH/tRYOljVXNRNNPfXXjHNNtbeNNLdWtNQ/uHTNNNoXvLNNvtzNNNXNPbNNNNGZNVNADNNNOZNNORNNagVNNNXo0xNNNbYO4jWNNNoSC4OQNtfSPtPNNNePjW7FNNNPtqiFtNNPtNNNNpXXjNTXyVNNvtzNNNXNNWmFjNNPa1VNNNXXv4bTNNNObNZNNNRXu4PXPLNNNbdNNOPH0cPNDNONNNNNNNZNNNNqwVhZP41ZQplAjNNNNNSNTjNNNPbPDNNV34NNODXNNOjPDNNV1A0pzyhM3ZNNNNNuOZNNTDNNNNwIIZN6OZNNONNNNNwE1IWENNNNCtGNNQ0ONNNV0Wfo2VNNNNNNNNNNtNNNIpIbtxWQjNNNCbOZjNJNNNONNNNBDNNNNfNNNNZNNNNVjNNNORNNNOYNNNNCjNNNOZNNNNTNNNNPtNNNNjNNNNWNNNNNDNNNNDNNNNONNNNNjNNNNZNNNNPNNNNNNNZODRNNNNNNNLNdtBJOjLNSjFJOjLNztYZOt8NQttNNNLN2jXzODLNwDBzODLN/tBzODLNltBzODLN4jBzODL
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.620000.1.unpack, frmLogin.csBase64 encoded string: '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
        Source: 10.0.bbbe7872ea466446da60c4da50020cbb.exe.720000.0.unpack, frmLogin.csBase64 encoded string: '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
        Source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.720000.0.unpack, frmLogin.csBase64 encoded string: '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
        Source: 11.2.dhcpmon.exe.720000.0.unpack, frmLogin.csBase64 encoded string: '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
        Source: classification engineClassification label: mal100.troj.evad.winEXE@20/8@20/1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_051706DA AdjustTokenPrivileges,
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_051706A3 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bbbe7872ea466446da60c4da50020cbb.exe.logJump to behavior
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7080:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7132:120:WilError_01
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{d1470c94-c693-4be3-b7c3-884d57fb2b86}
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7E95.tmpJump to behavior
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
        Source: bbbe7872ea466446da60c4da50020cbb.exeReversingLabs: Detection: 34%
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile read: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe 'C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe'
        Source: unknownProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp81B3.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp'
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp81B3.tmp'
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: bbbe7872ea466446da60c4da50020cbb.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348914863.0000000008030000.00000002.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.369455397.0000000007BC0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.372863219.0000000007CF0000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.386840376.0000000007650000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 0_2_04F08420 pushad ; iretd
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_0111AD35 push cs; retf
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_01119D74 push eax; retf
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_01119D78 pushad ; retf
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_0111ADA9 push cs; retf
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_011174B8 push ebp; ret
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_011174AC push ecx; ret
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_0111ACC1 push cs; retf
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 10_2_02968420 pushad ; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_02B08420 pushad ; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.59845021391
        Source: initial sampleStatic PE information: section name: .text entropy: 7.59845021391
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeFile opened: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5656, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6084, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 5620, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6780, type: MEMORY
        Source: Yara matchFile source: 15.2.dhcpmon.exe.28588ac.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.2d78900.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.2e18918.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.2f888c4.1.raw.unpack, type: UNPACKEDPE
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeWindow / User API: foregroundWindowGot 894
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 6784Thread sleep time: -103297s >= -30000s
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 6808Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 3912Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 3912Thread sleep count: 174 > 30
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 3912Thread sleep count: 271 > 30
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 4876Thread sleep count: 296 > 30
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 492Thread sleep time: -220000s >= -30000s
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 4828Thread sleep time: -99751s >= -30000s
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 4064Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4704Thread sleep time: -100504s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4532Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe TID: 6328Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6024Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5960Thread sleep time: -103946s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5720Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4744Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeMemory written: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeMemory written: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp'
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp81B3.tmp'
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeProcess created: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597421773.0000000002F4B000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.594434140.0000000001360000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.594434140.0000000001360000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.594434140.0000000001360000.00000002.00000001.sdmpBinary or memory string: &Program Manager
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597421773.0000000002F4B000.00000004.00000001.sdmpBinary or memory string: Program Managerv
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.594434140.0000000001360000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeCode function: 4_2_0110AF9A GetUserNameW,
        Source: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORY
        Source: Yara matchFile source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: bbbe7872ea466446da60c4da50020cbb.exe, 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 348, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6340, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6332, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bbbe7872ea466446da60c4da50020cbb.exe PID: 6996, type: MEMORY
        Source: Yara matchFile source: 16.2.dhcpmon.exe.40530dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3de9c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d79c7e.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.40c14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.3adb170.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.4049c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3df30dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.420b170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d830dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d0eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3f0a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.411a0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.bbbe7872ea466446da60c4da50020cbb.exe.3deeab4.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39914a0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.404eab4.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d130dd.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 16.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.dhcpmon.exe.3d7eab4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3eb14a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3f514a0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.bbbe7872ea466446da60c4da50020cbb.exe.3d09c7e.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.dhcpmon.exe.39ea0c0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.409b170.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 10.2.bbbe7872ea466446da60c4da50020cbb.exe.3faa0c0.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.bbbe7872ea466446da60c4da50020cbb.exe.3ffb170.4.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading2Input Capture11Security Software Discovery21Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Virtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information31Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing13/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 358272 Sample: bbbe7872ea466446da60c4da500... Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 50 cloudhost.myfirewall.org 2->50 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 13 other signatures 2->60 9 bbbe7872ea466446da60c4da50020cbb.exe 3 2->9         started        13 dhcpmon.exe 3 2->13         started        15 bbbe7872ea466446da60c4da50020cbb.exe 2 2->15         started        17 dhcpmon.exe 2 2->17         started        signatures3 process4 file5 48 bbbe7872ea466446da60c4da50020cbb.exe.log, ASCII 9->48 dropped 64 Injects a PE file into a foreign processes 9->64 19 bbbe7872ea466446da60c4da50020cbb.exe 1 14 9->19         started        24 dhcpmon.exe 2 13->24         started        26 dhcpmon.exe 13->26         started        28 bbbe7872ea466446da60c4da50020cbb.exe 2 15->28         started        30 dhcpmon.exe 17->30         started        signatures6 process7 dnsIp8 52 cloudhost.myfirewall.org 79.134.225.105, 49712, 49713, 49714 FINK-TELECOM-SERVICESCH Switzerland 19->52 40 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->40 dropped 42 C:\Users\user\AppData\Roaming\...\run.dat, data 19->42 dropped 44 C:\Users\user\AppData\Local\...\tmp7E95.tmp, XML 19->44 dropped 46 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->46 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 32 schtasks.exe 1 19->32         started        34 schtasks.exe 1 19->34         started        file9 signatures10 process11 process12 36 conhost.exe 32->36         started        38 conhost.exe 34->38         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        bbbe7872ea466446da60c4da50020cbb.exe35%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        bbbe7872ea466446da60c4da50020cbb.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe35%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        14.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.bbbe7872ea466446da60c4da50020cbb.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        SourceDetectionScannerLabelLink
        cloudhost.myfirewall.org1%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        cloudhost.myfirewall.org0%Avira URL Cloudsafe
        http://www.carterandcone.com&0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.carterandcone.comormD0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com0%URL Reputationsafe
        http://www.carterandcone.com.0%URL Reputationsafe
        http://www.carterandcone.com.0%URL Reputationsafe
        http://www.carterandcone.com.0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.carterandcone.como.0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.carterandcone.comTC0%URL Reputationsafe
        http://www.zhongyicts.com.cnp0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/D0%Avira URL Cloudsafe
        http://www.gagalive.kr/livechat1.swf?chatroom=inchat-0%Avira URL Cloudsafe
        http://en.w0%URL Reputationsafe
        http://en.w0%URL Reputationsafe
        http://en.w0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.carterandcone.comTCw0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/vvT0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        cloudhost.myfirewall.org
        79.134.225.105
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        cloudhost.myfirewall.orgtrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersGbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
          high
          http://www.carterandcone.com&bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329135863.00000000051A7000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          low
          http://www.fontbureau.com/designers/?bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bThebbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers?bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
              high
              http://www.carterandcone.comormDbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comdhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersdhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                high
                http://www.goodfont.co.krbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.combbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329135863.00000000051A7000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmpfalse
                  high
                  http://www.carterandcone.com.bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.combbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cn/cThebbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.combbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp//bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/DPleasebbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.ascendercorp.com/typedesigners.htmlbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.330244134.00000000051DD000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/(bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fonts.combbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                    high
                    http://www.sandoll.co.krbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.deDPleasebbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.como.bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.combbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schooldb.inchat.kro.kr/dhcpmon.exe, dhcpmon.exe, 0000000E.00000002.378594437.0000000000502000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.371490717.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 00000010.00000002.390560823.00000000008F2000.00000002.00020000.sdmp, bbbe7872ea466446da60c4da50020cbb.exefalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.combbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                          high
                          http://www.galapagosdesign.com/bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.334789389.00000000051D5000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://inchat.kro.krdhcpmon.exe, dhcpmon.exe, 0000000E.00000002.378594437.0000000000502000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.371490717.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 00000010.00000002.390560823.00000000008F2000.00000002.00020000.sdmp, bbbe7872ea466446da60c4da50020cbb.exefalse
                            high
                            http://www.fontbureau.com/designers/cabarga.htmlobbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.333166545.00000000051D5000.00000004.00000001.sdmpfalse
                              high
                              http://www.carterandcone.comTCbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnpbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/Dbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.gagalive.kr/livechat1.swf?chatroom=inchat-dhcpmon.exe, dhcpmon.exe, 0000000E.00000002.378594437.0000000000502000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.371490717.0000000000042000.00000002.00020000.sdmp, dhcpmon.exe, 00000010.00000002.390560823.00000000008F2000.00000002.00020000.sdmp, bbbe7872ea466446da60c4da50020cbb.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://en.wbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.325630674.00000000051A9000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comlbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.327774459.00000000051AB000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cnbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.332711004.00000000051D5000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/cabarga.htmlbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.333166545.00000000051D5000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.carterandcone.comTCwbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.328197714.00000000051A6000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/vvTbbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000003.329603375.00000000051A8000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers8bbbe7872ea466446da60c4da50020cbb.exe, 00000000.00000002.348097971.00000000063B2000.00000004.00000001.sdmp, bbbe7872ea466446da60c4da50020cbb.exe, 0000000A.00000002.367125363.0000000005320000.00000002.00000001.sdmp, dhcpmon.exe, 0000000B.00000002.370057992.0000000005450000.00000002.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.382568285.0000000004EB0000.00000002.00000001.sdmpfalse
                                      high

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      79.134.225.105
                                      unknownSwitzerland
                                      6775FINK-TELECOM-SERVICESCHtrue

                                      General Information

                                      Joe Sandbox Version:31.0.0 Emerald
                                      Analysis ID:358272
                                      Start date:25.02.2021
                                      Start time:11:23:48
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 13m 35s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:bbbe7872ea466446da60c4da50020cbb.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:37
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@20/8@20/1
                                      EGA Information:Failed
                                      HDC Information:
                                      • Successful, ratio: 0.7% (good quality ratio 0.6%)
                                      • Quality average: 61.9%
                                      • Quality standard deviation: 18.7%
                                      HCA Information:
                                      • Successful, ratio: 86%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .exe
                                      Warnings:
                                      Show All
                                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                      • TCP Packets have been reduced to 100
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                      • Excluded IPs from analysis (whitelisted): 51.103.5.186, 104.43.139.144, 204.79.197.200, 13.107.21.200, 23.218.209.198, 104.42.151.234, 92.122.145.220, 52.255.188.83, 51.104.144.132, 67.26.75.254, 8.253.207.120, 8.248.147.254, 67.27.158.254, 8.248.137.254, 52.155.217.156, 51.103.5.159, 20.54.26.129, 92.122.213.247, 92.122.213.194, 104.43.193.48, 51.104.139.180, 184.30.20.56
                                      • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e16646.dscg.akamaiedge.net, skypedataprdcolwus16.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      11:24:42API Interceptor911x Sleep call for process: bbbe7872ea466446da60c4da50020cbb.exe modified
                                      11:24:47Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe" s>$(Arg0)
                                      11:24:48Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                      11:24:49API Interceptor2x Sleep call for process: dhcpmon.exe modified
                                      11:24:49AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      79.134.225.105e92b274943f4a3a557881ee0dd57772d.exeGet hashmaliciousBrowse
                                        5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                          f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                            256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                              d88e07467ddcf9e3b19fa972b9f000d1.exeGet hashmaliciousBrowse
                                                73a4f40d0affe5eea89174f8917bba73.exeGet hashmaliciousBrowse
                                                  9a08c8a2b49d6348f2ef35f85a1c6351.exeGet hashmaliciousBrowse
                                                    7eec14e7cec4dc93fbf53e08998b2340.exeGet hashmaliciousBrowse
                                                      f2a22415c1b108ce91fd76e3320431d0.exeGet hashmaliciousBrowse
                                                        1d8eff2bc76e46dc186fa501e24f5cb1.exeGet hashmaliciousBrowse
                                                          1464bbe24dac1f403f15b3c3860f37ca.exeGet hashmaliciousBrowse
                                                            1d78424ce6944359d546dbcbc030f19e.exeGet hashmaliciousBrowse
                                                              84ab43f7eda35ae038b199d3a3586b77.exeGet hashmaliciousBrowse
                                                                Require_Quote_20200128 SSG.pdf ind.exeGet hashmaliciousBrowse
                                                                  DHL FILE 987634732.exeGet hashmaliciousBrowse
                                                                    file.exeGet hashmaliciousBrowse
                                                                      NKF20205 LIST.exeGet hashmaliciousBrowse
                                                                        URGENT PO.exeGet hashmaliciousBrowse
                                                                          scan002947779488.exeGet hashmaliciousBrowse

                                                                            Domains

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            cloudhost.myfirewall.orge92b274943f4a3a557881ee0dd57772d.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            9a08c8a2b49d6348f2ef35f85a1c6351.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            zSDBuG8gDl.exeGet hashmaliciousBrowse
                                                                            • 185.229.243.67
                                                                            65d1beae1fc7eb126cd4a9b277afb942.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.96
                                                                            f2a22415c1b108ce91fd76e3320431d0.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            1d8eff2bc76e46dc186fa501e24f5cb1.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            5134b758f8eb77424254ce67f4697ffe.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.96
                                                                            1d8eff2bc76e46dc186fa501e24f5cb1.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.96
                                                                            460f7e6048ed3ca91f1573a7410fedd6.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.96
                                                                            1d78424ce6944359d546dbcbc030f19e.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105

                                                                            ASN

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            FINK-TELECOM-SERVICESCHcp573oYDUX.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.43
                                                                            Y5XyMnx8Ng.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.43
                                                                            YoWPu2BQzA9FeDd.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.43
                                                                            xF7GogN7tM.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.120
                                                                            TZgGVyMJYF.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.74
                                                                            ilpbALnKbE.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.103
                                                                            Documents.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.87
                                                                            SWcNyi2YBj.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.103
                                                                            Confirmation Transfer Note Ref Number0002636.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.8
                                                                            TdX45jQWjj.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.43
                                                                            e92b274943f4a3a557881ee0dd57772d.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            WxTm2cWLHF.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.71
                                                                            Payment Confirmation.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.30
                                                                            rjHlt1zz28.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.49
                                                                            Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                                            • 79.134.225.49
                                                                            document.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.122
                                                                            5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.105
                                                                            JOIN.exeGet hashmaliciousBrowse
                                                                            • 79.134.225.30

                                                                            JA3 Fingerprints

                                                                            No context

                                                                            Dropped Files

                                                                            No context

                                                                            Created / dropped Files

                                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):487424
                                                                            Entropy (8bit):7.585377119878555
                                                                            Encrypted:false
                                                                            SSDEEP:12288:13Wp0pFZhvpNkMtT4vH2PEe4nU7YTRwiQSBuDG9RDQ1Ln:1ZFZDWocvHwt4bqDMDQF
                                                                            MD5:88EF84E623F21AF8C30D3BBA321A7448
                                                                            SHA1:701339B101C76FA1BA159C66B48EF2F9B6D73AA8
                                                                            SHA-256:0095C39F2D6F62DEA9FD6D066DECAB6F0A7ACAB87829F659EFD01BC1D2564BD0
                                                                            SHA-512:2441191F7FE76BFEF584960ED21EC576DD36D0FD37882F77A91A0FC05921A7B459E030FCBC4E3A3207F55BA9D8992CDD69F20A87C1837FF2EAC13C1F89D16035
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            • Antivirus: ReversingLabs, Detection: 35%
                                                                            Reputation:low
                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....6`..............P..f............... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...4d... ...f.................. ..`.rsrc................h..............@..@.reloc...............n..............@..B........................H...........lE...........:...I...........................................0............(....(..........(.....o.....*.....................(.......( ......(!......("......(#....*N..(....o....($....*&..(%....*.s&........s'........s(........s)........s*........*....0...........~....o+....+..*.0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0..<........~.....(0.....,!r...p.....(1...o2...s3............~.....+..*.0......
                                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):26
                                                                            Entropy (8bit):3.95006375643621
                                                                            Encrypted:false
                                                                            SSDEEP:3:ggPYV:rPYV
                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                            Malicious:true
                                                                            Reputation:high, very likely benign file
                                                                            Preview: [ZoneTransfer]....ZoneId=0
                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bbbe7872ea466446da60c4da50020cbb.exe.log
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):664
                                                                            Entropy (8bit):5.288448637977022
                                                                            Encrypted:false
                                                                            SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                                                            MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                                                            SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                                                            SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                                                            SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                                                            Malicious:true
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):664
                                                                            Entropy (8bit):5.288448637977022
                                                                            Encrypted:false
                                                                            SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                                                            MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                                                            SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                                                            SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                                                            SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                                                            C:\Users\user\AppData\Local\Temp\tmp7E95.tmp
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1325
                                                                            Entropy (8bit):5.142681781286418
                                                                            Encrypted:false
                                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0VxuDxtn:cbk4oL600QydbQxIYODOLedq3iij
                                                                            MD5:84A099124F6C7EE51E18E71DC7BC3A9B
                                                                            SHA1:1711144C438CBDF89365DB7FA6321956BC973CF7
                                                                            SHA-256:8239178C04A3BA7C0A51E29EA046C53C7DFD6434CA19F053730578CEB231B4F9
                                                                            SHA-512:E3653310916ADF9C0A96AAC010900B7E2A7B7156651A06B53E75110A212A1C9A6489CE58E9D856B8A4DD473612D91C760D5855B9E3200496B3D4204DF4AA91AF
                                                                            Malicious:true
                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                            C:\Users\user\AppData\Local\Temp\tmp81B3.tmp
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                            Category:modified
                                                                            Size (bytes):1310
                                                                            Entropy (8bit):5.109425792877704
                                                                            Encrypted:false
                                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                            MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                            SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                            SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                            SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                            Malicious:false
                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):8
                                                                            Entropy (8bit):3.0
                                                                            Encrypted:false
                                                                            SSDEEP:3:hn:h
                                                                            MD5:D31129909503FD8FFBD27BEC609FAEFB
                                                                            SHA1:31E23DEAE7A4A3318FEDE87058CD39880371C5A6
                                                                            SHA-256:A8BD14E933B3B91C59B72BBE9F0CE37D00BFD53DC4E41A838E4488F8B1C4FDC4
                                                                            SHA-512:C3CC657202070CF423E811054FBB0C4DC48BC2545DD7DC0DD2FD4D392F17985C71D920E918FD145F2DEE0C85691CD4F43F664B13A0E07B279DC1A63E7D57AE38
                                                                            Malicious:true
                                                                            Preview: ..E....H
                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                            Process:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):62
                                                                            Entropy (8bit):4.443732754068415
                                                                            Encrypted:false
                                                                            SSDEEP:3:oNN2+WHAuK1T95RbXVQHLNn:oNN2RguuhbXVQrNn
                                                                            MD5:1305CC0074A93B66ED5F48F9F5525B0A
                                                                            SHA1:FF47387DBEDCF1D78859AE5E69D68087E9D001B8
                                                                            SHA-256:2683F197FE07E73150EFC619A6D18BD2D459B37B243B109A350F697E50033E38
                                                                            SHA-512:54CAD3A91F06B1651FEF9F3B34ED4DCC4445D36D4E77E8F61A8C74049ADD13CBFDB8F246CFDE78CB634170234D04C30726B5E4956955FDCEE7AC5760E1A8881C
                                                                            Malicious:false
                                                                            Preview: C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe

                                                                            Static File Info

                                                                            General

                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.585377119878555
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Windows Screen Saver (13104/52) 0.07%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            File name:bbbe7872ea466446da60c4da50020cbb.exe
                                                                            File size:487424
                                                                            MD5:88ef84e623f21af8c30d3bba321a7448
                                                                            SHA1:701339b101c76fa1ba159c66b48ef2f9b6d73aa8
                                                                            SHA256:0095c39f2d6f62dea9fd6d066decab6f0a7acab87829f659efd01bc1d2564bd0
                                                                            SHA512:2441191f7fe76bfef584960ed21ec576dd36d0fd37882f77a91a0fc05921a7b459e030fcbc4e3a3207f55ba9d8992cdd69f20a87c1837ff2eac13c1f89d16035
                                                                            SSDEEP:12288:13Wp0pFZhvpNkMtT4vH2PEe4nU7YTRwiQSBuDG9RDQ1Ln:1ZFZDWocvHwt4bqDMDQF
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....6`..............P..f............... ........@.. ....................................@................................

                                                                            File Icon

                                                                            Icon Hash:00828e8e8686b000

                                                                            Static PE Info

                                                                            General

                                                                            Entrypoint:0x47842e
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                            Time Stamp:0x6036DFEC [Wed Feb 24 23:23:24 2021 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:v2.0.50727
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                            Entrypoint Preview

                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al

                                                                            Data Directories

                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x783dc0x4f.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x7a0000x5dc.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7c0000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                            Sections

                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x764340x76600False0.81248968783data7.59845021391IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x7a0000x5dc0x600False0.43359375data4.18581494296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x7c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                            Resources

                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_VERSION0x7a0900x34cdata
                                                                            RT_MANIFEST0x7a3ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                            Imports

                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain

                                                                            Version Infos

                                                                            DescriptionData
                                                                            Translation0x0000 0x04b0
                                                                            LegalCopyrightCopyright 2016 - 2021
                                                                            Assembly Version1.0.0.0
                                                                            InternalNameSystemLazyDebugView.exe
                                                                            FileVersion1.0.0.0
                                                                            CompanyName
                                                                            LegalTrademarks
                                                                            Comments
                                                                            ProductNameASM PS
                                                                            ProductVersion1.0.0.0
                                                                            FileDescriptionASM PS
                                                                            OriginalFilenameSystemLazyDebugView.exe

                                                                            Network Behavior

                                                                            Network Port Distribution

                                                                            TCP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Feb 25, 2021 11:24:48.626800060 CET497125654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:24:48.709671974 CET56544971279.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:24:49.325844049 CET497125654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:24:49.410424948 CET56544971279.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:24:50.025794983 CET497125654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:24:50.109920979 CET56544971279.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:24:54.695738077 CET497135654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:24:54.783087969 CET56544971379.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:24:55.354371071 CET497135654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:24:55.439676046 CET56544971379.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:24:56.058144093 CET497135654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:24:56.145593882 CET56544971379.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:00.273941040 CET497145654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:00.358505964 CET56544971479.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:00.870687962 CET497145654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:00.955174923 CET56544971479.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:01.464282036 CET497145654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:01.547135115 CET56544971479.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:05.998193979 CET497215654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:06.080715895 CET56544972179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:06.589694977 CET497215654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:06.673861980 CET56544972179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:07.183506966 CET497215654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:07.266280890 CET56544972179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:11.364681959 CET497275654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:11.450200081 CET56544972779.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:12.121423006 CET497275654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:12.209835052 CET56544972779.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:12.824589014 CET497275654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:12.910170078 CET56544972779.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:17.076725006 CET497305654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:17.161436081 CET56544973079.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:17.668745041 CET497305654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:17.751597881 CET56544973079.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:18.262532949 CET497305654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:18.347594023 CET56544973079.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:22.442135096 CET497315654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:22.529938936 CET56544973179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:23.044122934 CET497315654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:23.132652044 CET56544973179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:23.637950897 CET497315654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:23.730770111 CET56544973179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:27.997536898 CET497385654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:28.080324888 CET56544973879.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:28.591954947 CET497385654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:28.677618027 CET56544973879.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:29.202150106 CET497385654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:29.284926891 CET56544973879.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:33.562685013 CET497455654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:33.648861885 CET56544974579.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:34.201298952 CET497455654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:34.294214010 CET56544974579.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:34.904462099 CET497455654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:34.989918947 CET56544974579.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:39.131872892 CET497525654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:39.214664936 CET56544975279.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:39.717439890 CET497525654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:39.800367117 CET56544975279.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:40.311438084 CET497525654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:40.394157887 CET56544975279.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:44.567759037 CET497535654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:44.653165102 CET56544975379.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:45.155433893 CET497535654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:45.240783930 CET56544975379.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:45.749188900 CET497535654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:45.835782051 CET56544975379.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:49.973664045 CET497575654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:50.060617924 CET56544975779.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:50.562046051 CET497575654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:25:50.651330948 CET56544975779.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:25:51.155955076 CET497575654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:07.282320023 CET497615654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:07.372164011 CET56544976179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:07.876277924 CET497615654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:07.958929062 CET56544976179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:08.469770908 CET497615654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:08.552668095 CET56544976179.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:12.692601919 CET497645654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:12.779438972 CET56544976479.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:13.282622099 CET497645654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:13.368633032 CET56544976479.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:13.876403093 CET497645654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:13.963768005 CET56544976479.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:18.590110064 CET497655654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:18.677874088 CET56544976579.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:19.189440966 CET497655654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:19.277095079 CET56544976579.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:19.783225060 CET497655654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:19.868992090 CET56544976579.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:24.321764946 CET497665654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:24.409323931 CET56544976679.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:24.928036928 CET497665654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:25.013566017 CET56544976679.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:25.518033028 CET497665654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:25.603816032 CET56544976679.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:29.753073931 CET497685654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:29.837347031 CET56544976879.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:30.354100943 CET497685654192.168.2.679.134.225.105
                                                                            Feb 25, 2021 11:26:30.436645985 CET56544976879.134.225.105192.168.2.6
                                                                            Feb 25, 2021 11:26:30.947804928 CET497685654192.168.2.679.134.225.105

                                                                            UDP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Feb 25, 2021 11:24:27.117582083 CET5772553192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:27.166593075 CET53577258.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:28.176310062 CET4928353192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:28.217499971 CET5837753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:28.225069046 CET53492838.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:28.269035101 CET53583778.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:29.046103001 CET5507453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:29.118208885 CET53550748.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:29.214934111 CET5451353192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:29.264540911 CET53545138.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:30.449815035 CET6204453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:30.501537085 CET53620448.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:32.090500116 CET6379153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:32.160540104 CET53637918.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:33.270864010 CET6426753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:33.319513083 CET53642678.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:34.359849930 CET4944853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:34.411431074 CET53494488.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:48.212694883 CET6034253192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:48.389832020 CET53603428.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:24:54.637378931 CET6134653192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:24:54.694610119 CET53613468.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:00.210314035 CET5177453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:00.270603895 CET53517748.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:03.047249079 CET5602353192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:03.095995903 CET53560238.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:04.005820990 CET5838453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:04.054773092 CET53583848.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:04.948786020 CET6026153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:04.997585058 CET53602618.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:05.491166115 CET5606153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:05.542964935 CET53560618.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:05.925417900 CET5833653192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:05.988379002 CET53583368.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:06.118753910 CET5378153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:06.167573929 CET53537818.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:07.061675072 CET5406453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:07.110531092 CET53540648.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:08.066205025 CET5281153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:08.115267038 CET53528118.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:08.901803970 CET5529953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:08.962486029 CET53552998.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:10.411164999 CET6374553192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:10.468545914 CET53637458.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:11.305735111 CET5005553192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:11.363370895 CET53500558.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:13.473772049 CET6137453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:13.523927927 CET53613748.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:14.458923101 CET5033953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:14.508641005 CET53503398.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:17.018151045 CET6330753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:17.075424910 CET53633078.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:22.383959055 CET4969453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:22.440958977 CET53496948.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:22.454272032 CET5498253192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:22.506934881 CET53549828.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:25.711648941 CET5001053192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:25.768949032 CET53500108.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:26.315239906 CET6371853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:26.366815090 CET53637188.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:27.118741989 CET6211653192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:27.126820087 CET6381653192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:27.175472021 CET53638168.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:27.175956011 CET53621168.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:27.606359005 CET5501453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:27.663378954 CET53550148.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:27.907069921 CET6220853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:27.952208042 CET5757453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:27.964279890 CET53622088.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:28.019773006 CET53575748.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:28.168005943 CET5181853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:28.225503922 CET53518188.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:28.942802906 CET5662853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:29.002837896 CET53566288.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:30.171575069 CET6077853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:30.232163906 CET53607788.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:31.825973988 CET5379953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:31.874722958 CET53537998.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:33.121190071 CET5468353192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:33.173006058 CET53546838.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:33.444616079 CET5932953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:33.494067907 CET53593298.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:33.657452106 CET6402153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:33.707140923 CET53640218.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:36.012670040 CET5612953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:36.075216055 CET53561298.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:39.068284988 CET5817753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:39.117019892 CET53581778.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:44.506081104 CET5070053192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:44.566046000 CET53507008.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:45.987143993 CET5406953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:46.037607908 CET53540698.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:47.105782032 CET6117853192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:47.158185005 CET53611788.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:48.100619078 CET5701753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:48.150759935 CET53570178.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:25:49.913017988 CET5632753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:25:49.971278906 CET53563278.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:04.542124987 CET5024353192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:04.593692064 CET53502438.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:04.987422943 CET6205553192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:05.052566051 CET53620558.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:07.228221893 CET6124953192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:07.280585051 CET53612498.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:08.916820049 CET6525253192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:08.977189064 CET53652528.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:12.625998974 CET6436753192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:12.690673113 CET53643678.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:18.522969007 CET5506653192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:18.585977077 CET53550668.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:24.260216951 CET6021153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:24.320557117 CET53602118.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:28.934892893 CET5657053192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:28.983767033 CET53565708.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:29.690567017 CET5845453192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:29.752105951 CET53584548.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:35.151140928 CET5518053192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:35.208693981 CET53551808.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:40.576133966 CET5872153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:40.637666941 CET53587218.8.8.8192.168.2.6
                                                                            Feb 25, 2021 11:26:45.918656111 CET5769153192.168.2.68.8.8.8
                                                                            Feb 25, 2021 11:26:45.976176023 CET53576918.8.8.8192.168.2.6

                                                                            DNS Queries

                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                            Feb 25, 2021 11:24:48.212694883 CET192.168.2.68.8.8.80xeff6Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:24:54.637378931 CET192.168.2.68.8.8.80x104cStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:00.210314035 CET192.168.2.68.8.8.80xc159Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:05.925417900 CET192.168.2.68.8.8.80x556aStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:11.305735111 CET192.168.2.68.8.8.80xeb5Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:17.018151045 CET192.168.2.68.8.8.80x3637Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:22.383959055 CET192.168.2.68.8.8.80x15a1Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:27.907069921 CET192.168.2.68.8.8.80x8fb3Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:33.444616079 CET192.168.2.68.8.8.80x9128Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:39.068284988 CET192.168.2.68.8.8.80xc65dStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:44.506081104 CET192.168.2.68.8.8.80xbda7Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:49.913017988 CET192.168.2.68.8.8.80x1d2fStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:07.228221893 CET192.168.2.68.8.8.80xafc0Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:12.625998974 CET192.168.2.68.8.8.80xb43dStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:18.522969007 CET192.168.2.68.8.8.80xd2afStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:24.260216951 CET192.168.2.68.8.8.80xd4ecStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:29.690567017 CET192.168.2.68.8.8.80xd408Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:35.151140928 CET192.168.2.68.8.8.80x1c71Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:40.576133966 CET192.168.2.68.8.8.80x1429Standard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:45.918656111 CET192.168.2.68.8.8.80x7f8dStandard query (0)cloudhost.myfirewall.orgA (IP address)IN (0x0001)

                                                                            DNS Answers

                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                            Feb 25, 2021 11:24:48.389832020 CET8.8.8.8192.168.2.60xeff6No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:24:54.694610119 CET8.8.8.8192.168.2.60x104cNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:00.270603895 CET8.8.8.8192.168.2.60xc159No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:05.988379002 CET8.8.8.8192.168.2.60x556aNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:11.363370895 CET8.8.8.8192.168.2.60xeb5No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:17.075424910 CET8.8.8.8192.168.2.60x3637No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:22.440958977 CET8.8.8.8192.168.2.60x15a1No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:27.964279890 CET8.8.8.8192.168.2.60x8fb3No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:33.494067907 CET8.8.8.8192.168.2.60x9128No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:39.117019892 CET8.8.8.8192.168.2.60xc65dNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:44.566046000 CET8.8.8.8192.168.2.60xbda7No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:25:49.971278906 CET8.8.8.8192.168.2.60x1d2fNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:07.280585051 CET8.8.8.8192.168.2.60xafc0No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:12.690673113 CET8.8.8.8192.168.2.60xb43dNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:18.585977077 CET8.8.8.8192.168.2.60xd2afNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:24.320557117 CET8.8.8.8192.168.2.60xd4ecNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:29.752105951 CET8.8.8.8192.168.2.60xd408No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:35.208693981 CET8.8.8.8192.168.2.60x1c71No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:40.637666941 CET8.8.8.8192.168.2.60x1429No error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)
                                                                            Feb 25, 2021 11:26:45.976176023 CET8.8.8.8192.168.2.60x7f8dNo error (0)cloudhost.myfirewall.org79.134.225.105A (IP address)IN (0x0001)

                                                                            Code Manipulations

                                                                            Statistics

                                                                            Behavior

                                                                            Click to jump to process

                                                                            System Behavior

                                                                            General

                                                                            Start time:11:24:36
                                                                            Start date:25/02/2021
                                                                            Path:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe'
                                                                            Imagebase:0x590000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.343834467.0000000002D51000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.344108345.0000000003D51000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:43
                                                                            Start date:25/02/2021
                                                                            Path:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            Imagebase:0x620000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.592467577.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.597683140.0000000003D07000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:45
                                                                            Start date:25/02/2021
                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp7E95.tmp'
                                                                            Imagebase:0x340000
                                                                            File size:185856 bytes
                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:11:24:45
                                                                            Start date:25/02/2021
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff61de10000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:11:24:46
                                                                            Start date:25/02/2021
                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp81B3.tmp'
                                                                            Imagebase:0x340000
                                                                            File size:185856 bytes
                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:11:24:46
                                                                            Start date:25/02/2021
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff61de10000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:11:24:48
                                                                            Start date:25/02/2021
                                                                            Path:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe 0
                                                                            Imagebase:0x720000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.365772164.0000000003DF1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.364695909.0000000002DF1000.00000004.00000001.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:48
                                                                            Start date:25/02/2021
                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                            Imagebase:0x720000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.367529312.0000000003F61000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.367072310.0000000002F61000.00000004.00000001.sdmp, Author: Joe Security
                                                                            Antivirus matches:
                                                                            • Detection: 100%, Joe Sandbox ML
                                                                            • Detection: 35%, ReversingLabs
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:49
                                                                            Start date:25/02/2021
                                                                            Path:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\bbbe7872ea466446da60c4da50020cbb.exe
                                                                            Imagebase:0x790000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.375004523.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.377624667.0000000002DA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.377737091.0000000003DA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:52
                                                                            Start date:25/02/2021
                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Imagebase:0x1f0000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:54
                                                                            Start date:25/02/2021
                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Imagebase:0x500000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.381191346.0000000003D31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.381077094.0000000002D31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.378479336.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:58
                                                                            Start date:25/02/2021
                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                            Imagebase:0x40000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.379503086.0000000002831000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.380529240.0000000003831000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            Reputation:low

                                                                            General

                                                                            Start time:11:24:59
                                                                            Start date:25/02/2021
                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                            Imagebase:0x8f0000
                                                                            File size:487424 bytes
                                                                            MD5 hash:88EF84E623F21AF8C30D3BBA321A7448
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.391674013.0000000004001000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.390499078.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.391635582.0000000003001000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                            Reputation:low

                                                                            Disassembly

                                                                            Code Analysis

                                                                            Reset < >