Loading ...

Play interactive tourEdit tour

Analysis Report OjAJYVQ7iK.exe

Overview

General Information

Sample Name:OjAJYVQ7iK.exe
Analysis ID:385025
MD5:d7d3373ffbd938da6c7c8aa3dc57fa49
SHA1:44a01528433887323f7cd6495387ad189252d72d
SHA256:9829c2298ab32875e7379274c578fcbffcddaa36a262c74f69d113217913e5ca
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates many large memory junks
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • OjAJYVQ7iK.exe (PID: 4856 cmdline: 'C:\Users\user\Desktop\OjAJYVQ7iK.exe' MD5: D7D3373FFBD938DA6C7C8AA3DC57FA49)
    • OjAJYVQ7iK.exe (PID: 6772 cmdline: C:\Users\user\Desktop\OjAJYVQ7iK.exe MD5: D7D3373FFBD938DA6C7C8AA3DC57FA49)
      • schtasks.exe (PID: 6956 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 7084 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6C3D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • OjAJYVQ7iK.exe (PID: 7164 cmdline: C:\Users\user\Desktop\OjAJYVQ7iK.exe 0 MD5: D7D3373FFBD938DA6C7C8AA3DC57FA49)
  • dhcpmon.exe (PID: 5572 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: D7D3373FFBD938DA6C7C8AA3DC57FA49)
    • dhcpmon.exe (PID: 5884 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: D7D3373FFBD938DA6C7C8AA3DC57FA49)
  • dhcpmon.exe (PID: 5624 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: D7D3373FFBD938DA6C7C8AA3DC57FA49)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "89ddcccb-9ca7-4a7e-8f49-ad5044b8", "Group": "CRYPTED", "Domain1": "ludwigh.duckdns.org", "Domain2": "ghfsquad.duckdns.org", "Port": 8192, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x49a9d:$a: NanoCore
    • 0x49af6:$a: NanoCore
    • 0x49b33:$a: NanoCore
    • 0x49bac:$a: NanoCore
    • 0x5d257:$a: NanoCore
    • 0x5d26c:$a: NanoCore
    • 0x5d2a1:$a: NanoCore
    • 0x7624b:$a: NanoCore
    • 0x76260:$a: NanoCore
    • 0x76295:$a: NanoCore
    • 0x49aff:$b: ClientPlugin
    • 0x49b3c:$b: ClientPlugin
    • 0x4a43a:$b: ClientPlugin
    • 0x4a447:$b: ClientPlugin
    • 0x5d013:$b: ClientPlugin
    • 0x5d02e:$b: ClientPlugin
    • 0x5d05e:$b: ClientPlugin
    • 0x5d275:$b: ClientPlugin
    • 0x5d2aa:$b: ClientPlugin
    • 0x76007:$b: ClientPlugin
    • 0x76022:$b: ClientPlugin
    00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      Click to see the 5 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      25.2.dhcpmon.exe.3643ac8.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      25.2.dhcpmon.exe.3643ac8.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      25.2.dhcpmon.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      25.2.dhcpmon.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      25.2.dhcpmon.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 14 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\OjAJYVQ7iK.exe, ProcessId: 6772, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\OjAJYVQ7iK.exe, ParentImage: C:\Users\user\Desktop\OjAJYVQ7iK.exe, ParentProcessId: 6772, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp', ProcessId: 6956

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Antivirus / Scanner detection for submitted sampleShow sources
        Source: OjAJYVQ7iK.exeAvira: detected
        Antivirus detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: HEUR/AGEN.1137075
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exeAvira: detection malicious, Label: HEUR/AGEN.1137075
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exeAvira: detection malicious, Label: HEUR/AGEN.1137075
        Found malware configurationShow sources
        Source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "89ddcccb-9ca7-4a7e-8f49-ad5044b8", "Group": "CRYPTED", "Domain1": "ludwigh.duckdns.org", "Domain2": "ghfsquad.duckdns.org", "Port": 8192, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 48%Perma Link
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 89%
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exeMetadefender: Detection: 48%Perma Link
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exeReversingLabs: Detection: 89%
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exeMetadefender: Detection: 48%Perma Link
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exeReversingLabs: Detection: 89%
        Multi AV Scanner detection for submitted fileShow sources
        Source: OjAJYVQ7iK.exeVirustotal: Detection: 81%Perma Link
        Source: OjAJYVQ7iK.exeMetadefender: Detection: 48%Perma Link
        Source: OjAJYVQ7iK.exeReversingLabs: Detection: 89%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORY
        Source: Yara matchFile source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: OjAJYVQ7iK.exeJoe Sandbox ML: detected
        Source: 25.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: OjAJYVQ7iK.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
        Source: OjAJYVQ7iK.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49733 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49734 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49736 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49750 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49754 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49755 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49756 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49760 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49761 -> 192.169.69.25:8192
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49762 -> 192.169.69.25:8192
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: ludwigh.duckdns.org
        Source: Malware configuration extractorURLs: ghfsquad.duckdns.org
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: ludwigh.duckdns.org
        Source: unknownDNS query: name: ghfsquad.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.3:49730 -> 79.134.225.112:8192
        Source: Joe Sandbox ViewIP Address: 192.169.69.25 192.169.69.25
        Source: Joe Sandbox ViewIP Address: 192.169.69.25 192.169.69.25
        Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
        Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
        Source: unknownDNS traffic detected: queries for: ludwigh.duckdns.org
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194304933.000000000106D000.00000004.00000001.sdmpString found in binary or memory: http://en.wg
        Source: OjAJYVQ7iK.exe, 00000001.00000003.198423875.0000000004FFD000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: OjAJYVQ7iK.exe, 00000001.00000003.198068340.0000000004FF9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
        Source: OjAJYVQ7iK.exe, 00000001.00000003.198068340.0000000004FF9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersP?
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194547907.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194562488.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comX
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194586100.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comcc
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194586100.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comic
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194562488.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comt
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195576488.000000000502D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195587180.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn.
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195713949.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195713949.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/nX
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195587180.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cners
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195576488.000000000502D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cns-cTt
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/(
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/7
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Micri
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Verd
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ana
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/t
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194547907.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194547907.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coma-d#
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195250311.0000000004FF9000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr/
        Source: OjAJYVQ7iK.exe, 00000001.00000003.195250311.0000000004FF9000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krj
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194725696.000000000500B000.00000004.00000001.sdmp, OjAJYVQ7iK.exe, 00000001.00000003.194739543.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194711594.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comc
        Source: OjAJYVQ7iK.exe, 00000001.00000003.194711594.000000000500B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comm
        Source: dhcpmon.exe, 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORY
        Source: Yara matchFile source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPE

        Operating System Destruction:

        barindex
        Protects its processes via BreakOnTermination flagShow sources
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: 01 00 00 00 Jump to behavior

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.dhcpmon.exe.3643ac8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess Stats: CPU usage > 98%
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_032323A025_2_032323A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_03232FA825_2_03232FA8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_0323306F25_2_0323306F
        Source: OjAJYVQ7iK.exeBinary or memory string: OriginalFilenameXZ2Studio.exe4 vs OjAJYVQ7iK.exe
        Source: OjAJYVQ7iK.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.dhcpmon.exe.3643ac8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.dhcpmon.exe.3643ac8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: OjAJYVQ7iK.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: mOcj0RclyeUq.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.16.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: hTwyiugpwdBi.exe.22.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@14/8@28/3
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile created: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7lJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6992:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_01
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{89ddcccb-9ca7-4a7e-8f49-ad5044b8e59c}
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile created: C:\Users\user\AppData\Local\Temp\tmp691F.tmpJump to behavior
        Source: OjAJYVQ7iK.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: OjAJYVQ7iK.exeVirustotal: Detection: 81%
        Source: OjAJYVQ7iK.exeMetadefender: Detection: 48%
        Source: OjAJYVQ7iK.exeReversingLabs: Detection: 89%
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile read: C:\Users\user\Desktop\OjAJYVQ7iK.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\OjAJYVQ7iK.exe 'C:\Users\user\Desktop\OjAJYVQ7iK.exe'
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Users\user\Desktop\OjAJYVQ7iK.exe C:\Users\user\Desktop\OjAJYVQ7iK.exe
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6C3D.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\OjAJYVQ7iK.exe C:\Users\user\Desktop\OjAJYVQ7iK.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Users\user\Desktop\OjAJYVQ7iK.exe C:\Users\user\Desktop\OjAJYVQ7iK.exeJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6C3D.tmp'Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
        Source: OjAJYVQ7iK.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
        Source: OjAJYVQ7iK.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: OjAJYVQ7iK.exe, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: mOcj0RclyeUq.exe.1.dr, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.0.OjAJYVQ7iK.exe.570000.0.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.16.dr, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 16.0.OjAJYVQ7iK.exe.e60000.0.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 21.0.OjAJYVQ7iK.exe.980000.0.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: hTwyiugpwdBi.exe.22.dr, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 22.0.dhcpmon.exe.fa0000.0.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 24.0.dhcpmon.exe.b50000.0.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 25.0.dhcpmon.exe.e50000.0.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 25.2.dhcpmon.exe.e50000.1.unpack, fTqEYeWFMQhsPKxFRRmEnZEJwVuS.cs.Net Code: nmxpdKhzmMqHIjnuSQngkJXRLhDX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94150093697
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94150093697
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94150093697
        Source: initial sampleStatic PE information: section name: .text entropy: 7.94150093697
        Source: OjAJYVQ7iK.exe, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: mOcj0RclyeUq.exe.1.dr, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 1.0.OjAJYVQ7iK.exe.570000.0.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: dhcpmon.exe.16.dr, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 16.0.OjAJYVQ7iK.exe.e60000.0.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 21.0.OjAJYVQ7iK.exe.980000.0.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: hTwyiugpwdBi.exe.22.dr, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 22.0.dhcpmon.exe.fa0000.0.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 24.0.dhcpmon.exe.b50000.0.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 25.0.dhcpmon.exe.e50000.0.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 25.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 25.2.dhcpmon.exe.e50000.1.unpack, RHyJpnYKyYvmCiSJeLWLPTXinWKq.csHigh entropy of concatenated method names: '.ctor', 'VCWrhkoRdnvSoBHIHtGqVixztNqV', 'HxohxcJYftEiRcHbyWrZspxhKcsX', 'upEaMTWbRQbdKAgXDRhvRWFObQhKA', 'iTRsDaDaUzihydTrbdNohregRIdj', 'soIKbrmkcWbvDEpueeCgdJKnbZfqA', 'JGfWXDCwgefgeMGeJJbPustwHwds', 'zWExstDPjBRWAHnAJgfeCpeexSfv', 'kZfVhIfsklEVVlEIlxAoTIVRfXRL', 'JAVUkotuhyOJiFsbSwyQjiHEGsYr'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile created: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exeJump to dropped file
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile created: C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exeJump to dropped file
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Creates an undocumented autostart registry key Show sources
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile opened: C:\Users\user\Desktop\OjAJYVQ7iK.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeFile opened: C:\Users\user\Desktop\OjAJYVQ7iK.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion:

        barindex
        Allocates many large memory junksShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory allocated: 8182000 memory commit 223170560Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory allocated: 15EC2000 memory commit 223170560Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory allocated: 236C2000 memory commit 223170560Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory allocated: 30EC2000 memory commit 223170560Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory allocated: 3E6C2000 memory commit 223170560Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory allocated: 4BEC2000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: 8072000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: 15DB2000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: 25022000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: 35CF2000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: 434F2000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: 24022000 memory commit 223170560Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 6804Thread sleep time: -42000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 6808Thread sleep time: -45000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 7144Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 7144Thread sleep count: 92 > 30Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 7144Thread sleep count: 60 > 30Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 7148Thread sleep count: 42 > 30Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exe TID: 7140Thread sleep time: -280000s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6288Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: OjAJYVQ7iK.exeBinary or memory string: ZGbcTyaerVwaxRiUKunITxysnISMAIEnumerable`1nmxpdKhzmMqHIjnuSQngkJXRLhDXUOehfNiQhzCQsIBEsRTieksaZsqG<FilterResources>d__2`1TIEnumerableSystem.CollectionsIEnumerator`1IDisposableIEnumeratorFJikjfknULkwtEdsxmOAViPEljdiLquBZMsrcxmcXZMmWdgdHYphLNmwyUjGllBWshgmAXBPIlzhNbDaXdArXdNGjOCMCtAUNCUZgiuyVLbaZZvoBYNahDKKXkPuBVsnrDqhXVvNjszankSZatRxdyPaQYfiTHdqUSKumoRQnAwuRNFFTWJlWAMyuiBSAIrMWbOxEDdnUNhgExYDlFpIdozEnGrHogJCVTIDictionaryEnumeratorSystem.IDisposable.DisposeMoveNextklXDyleqqqqqvFKVbZcLzDONHZSKASystem.Collections.Generic.IEnumerator<T>.get_Currentget_CurrentSystem.Collections.IEnumerator.ResetResetSystem.Collections.IEnumerator.get_CurrentSystem.Collections.Generic.IEnumerable<T>.GetEnumeratorGetEnumeratorSystem.Collections.IEnumerable.GetEnumeratorLbLEGHCQJzXCeBbOsjciMuzZqiTmEgWZpbNDaWaZLEkzCIiyHrDFagDIAXZ2StudioCompilationRelaxationsAttributeSystem.Runtime.CompilerServicesRuntimeCompatibilityAttributeDebuggableAttributeSystem.DiagnosticsDebuggingModesAssemblyTitleAttributeAssemblyDescriptionAttributeAssemblyConfigurationAttributeAssemblyCompanyAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyTrademarkAttributeComVisibleAttributeSystem.Runtime.InteropServicesGuidAttributeAssemblyFileVersionAttributeIListCompilerGeneratedAttributeSTAThreadAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDebuggerNonUserCodeAttributeEditorBrowsableAttributeEditorBrowsableStateDebuggerHiddenAttributeRHyJpnYKyYvmCiSJeLWLPTXinWKq.resourcesXZ2Studio.Properties.Resources.resourcesInvokeEnumeratorArrayResizePredicate`1ExistsCloneAddListViewItemget_ItemControlset_Textset_Tagget_ItemsListViewItemCollectionICollection`1get_CountClearget_ValueToStringop_Implicitop_AdditionEnvironmentExitContainerControlset_AutoScaleModeAutoScaleModeSystem.DrawingSizeset_Sizeset_TabIndexButtonBaseset_UseVisualStyleBackColorEventHandleradd_ClickPointset_Locationset_NamePaddingset_Marginset_UseCompatibleStateImageBehaviorget_ControlsControlCollectionSizeFset_AutoScaleDimensionsset_ClientSizeISupportInitializeBeginInitSuspendLayoutadd_ValueChangedset_AutoSizeResumeLayoutPerformLayoutFontFontStyleGraphicsUnitset_Fontadd_LoadEndInitget_CurrentCultureMemoryStreamByteReadDelegateop_InequalityApplicationEnableVisualStylesSetCompatibleTextRenderingDefaultRunGetTypeFromHandleRuntimeTypeHandleget_AssemblySettingsBaseSynchronizedNextset_ItemArgumentNullExceptionActivatorCreateInstanceGetExportedTypesICollectionLoadBadImageFormatExceptionSeekSeekOriginThreadSystem.Threadingget_CurrentThreadget_ManagedThreadIdDictionaryEntryGetTypeGetResourceSetResourceSetNotSupportedExceptionInit
        Source: OjAJYVQ7iK.exeBinary or memory string: XZ2Studio.exemscorlibUnverifiableCodeAttributeSystem.Security.ctor<Module>.cctorsEVLESGKohMiLNAtiXFzmfLrtgXFAttributeSystemRHyJpnYKyYvmCiSJeLWLPTXinWKqSystem.Windows.FormsFormDbWEDXHpVmqNUajsHoGBlICBNWVRyrBhdvHJKOoOFRSfXKzpdjzrYcTtACRRPjZnBZYwETxoSBhZJigBCjeubIContainerSystem.ComponentModeliiaehyfzbBNNerIdTRyxRSeHPiIJAButtonQFgNpIveHfIkERNyOBVHdhhaDgfuEZXziAOeGKzfpufjwROdqmOecNxAANumericUpDowntRvCUBQYKoWqPYxGcHryhSjYBEiFLabelbISreooRrCGMQwsSmggShHDGhIRgListViewVCWrhkoRdnvSoBHIHtGqVixztNqVEventArgsHxohxcJYftEiRcHbyWrZspxhKcsXAction`1upEaMTWbRQbdKAgXDRhvRWFObQhKAiTRsDaDaUzihydTrbdNohregRIdjsoIKbrmkcWbvDEpueeCgdJKnbZfqAList`1System.Collections.GenericJGfWXDCwgefgeMGeJJbPustwHwdszWExstDPjBRWAHnAJgfeCpeexSfvkZfVhIfsklEVVlEIlxAoTIVRfXRLJAVUkotuhyOJiFsbSwyQjiHEGsYrgnmZWzxOFrfAMLuofvxTSSbJLMPGDisposeJCERmWqAhBsWquDiCTxNbrOUmZs<>cObject<>9<>9__2_0<>9__2_1<>9__2_2<>9__2_3aoOetIwrLUhkpePpfFnCzmfcDWWCAyOQWosfwKunvOyLYCdoOuCxxHfJNBsnkYnibgtGgToonKDlPbRgMfIvnwBKvBqVqJlTFRaGTuzRNyIcwPgLl<>c__DisplayClass5_0VxNkRzwVTTTkFbeCqxzEyfIHtxZGiHODPmufYjesMHmlULOzeLOAHcDnFhFzQfQLOKcMeifOOATzjkNTOvscAjcaehqQEiAFebfHJUaZUSnIWjrIMAIList`1StreamSystem.IOVBYCdlBXmeeujbGCpQgaoOpjyTHOAIDictionary`2KyHbtSjGZFLVDMqEWHcgRRrkhBnZADecimalgttiiqjqfJhdExNcfQWxdeJOAQPEAgglJkoYnYmZKaZBwHkmoNEupNzMUDxbsXIYTceOKHWvcMbecrsaOxcTmResourcesXZ2Studio.PropertiesLVPSBgofOnJXcSVOxpDChNHZZWKjResourceManagerSystem.ResourcesfFAynEFUgDbEoOettnLTAKMfQLboCultureInfoSystem.GlobalizationxgaTuCeFSnVjWsbHBAEkHAaqvtGFPrfhvsXLepnNyomqxesLCIsqurOIAaoWALZblqNZJTdCFflDNBSAkDPduOlbrPQFqJVfDrGCVQEQbKBlNkZGabjoOTspwVujiRiUxIQqVOeLCsQXymSettingsApplicationSettingsBaseSystem.ConfigurationHOaMwPdSGTyeIBHdzGLAKCMGRNOcLyOtREAibJMguvufhQmNuTabvoiuDefaultEpWTAHYtANpiUxUPgmifWBvvzlDWCcOrAvPAIIDdFeMiAcUFBZyZQIPHARandomtamykRdLlKijaGudrZPiEHcJRdjenvfnizypPqEhWVYBEchGtjeEUwZQhAKJCbCJfosRNgLADKfFPmaEXVDictionary`2zZLqUNFaURvmKHXUJkyISATfBklJuvGvZNHklLJekhmZtqesaosOdpIyAssemblySystem.ReflectionzrhJlvrlAHFicDHwdrfHDWxfBmEpAozLKqrYHUwgYGafqQNXYhmWbQvrGztAFPGddEOXlTUKwLzxwbizrTHnMlEJhiAboJOLSdVgZfDNFJQPSakvrAajKemhZqUAKAqAAyMqTyyyrhDGhsnscZmlwEOuBqKmIhRjiKcFeFeHObbBgijFnANEAXFSiiIEmaWNsmDpFsYGhdmVVelYVYiuviiwBfYxqrsPzbBJLednRiwAOkIMRTHoWhFWrKrnnZOfRSgPZcUgLiojSewvJCxtmgpbOngbkbicwJElADAnPUBORMboFghgcHvfTypexxbGmKgKWybckPKjNCCNWuUnSmGZfTqEYeWFMQhsPKxFRRmEnZEJwVuSRGKbcGgofJKIsRjWWcvCvPrLgBqfAmPsDbHYUxaSLDehEDnGwapXMgOBFA
        Source: OjAJYVQ7iK.exeBinary or memory string: RHyJpnYKyYvmCiSJeLWLPTXinWKq
        Source: OjAJYVQ7iK.exeBinary or memory string: RHyJpnYKyYvmCiSJeLWLPTXinWKq.resources
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeMemory written: C:\Users\user\Desktop\OjAJYVQ7iK.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Users\user\Desktop\OjAJYVQ7iK.exe C:\Users\user\Desktop\OjAJYVQ7iK.exeJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6C3D.tmp'Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\OjAJYVQ7iK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORY
        Source: Yara matchFile source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: dhcpmon.exe, 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5884, type: MEMORY
        Source: Yara matchFile source: 25.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.467311d.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.4669cbe.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.dhcpmon.exe.466eaf4.5.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection111Masquerading2Input Capture11Security Software Discovery21Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Scheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSSystem Information Discovery12Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385025 Sample: OjAJYVQ7iK.exe Startdate: 11/04/2021 Architecture: WINDOWS Score: 100 44 ludwigh.duckdns.org 2->44 46 ghfsquad.duckdns.org 2->46 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 13 other signatures 2->60 9 OjAJYVQ7iK.exe 1 4 2->9         started        13 dhcpmon.exe 3 2->13         started        15 dhcpmon.exe 2 2->15         started        17 OjAJYVQ7iK.exe 2 2->17         started        signatures3 process4 file5 40 C:\Users\user\AppData\...\mOcj0RclyeUq.exe, PE32 9->40 dropped 66 Creates an undocumented autostart registry key 9->66 68 Uses schtasks.exe or at.exe to add and modify task schedules 9->68 70 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->70 19 OjAJYVQ7iK.exe 1 13 9->19         started        42 C:\Users\user\AppData\...\hTwyiugpwdBi.exe, PE32 13->42 dropped 72 Injects a PE file into a foreign processes 13->72 24 dhcpmon.exe 3 13->24         started        74 Allocates many large memory junks 15->74 signatures6 process7 dnsIp8 48 ghfsquad.duckdns.org 192.169.69.25, 49733, 49734, 49736 WOWUS United States 19->48 50 ludwigh.duckdns.org 79.134.225.112, 49730, 49731, 49732 FINK-TELECOM-SERVICESCH Switzerland 19->50 52 192.168.2.1 unknown unknown 19->52 34 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->34 dropped 36 C:\Users\user\AppData\Roaming\...\run.dat, data 19->36 dropped 38 C:\Users\user\AppData\Local\...\tmp691F.tmp, XML 19->38 dropped 62 Protects its processes via BreakOnTermination flag 19->62 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->64 26 schtasks.exe 1 19->26         started        28 schtasks.exe 1 19->28         started        file9 signatures10 process11 process12 30 conhost.exe 26->30         started        32 conhost.exe 28->32         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        OjAJYVQ7iK.exe81%VirustotalBrowse
        OjAJYVQ7iK.exe51%MetadefenderBrowse
        OjAJYVQ7iK.exe89%ReversingLabsByteCode-MSIL.Trojan.Persistence
        OjAJYVQ7iK.exe100%AviraHEUR/AGEN.1137075
        OjAJYVQ7iK.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraHEUR/AGEN.1137075
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exe100%AviraHEUR/AGEN.1137075
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exe100%AviraHEUR/AGEN.1137075
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe51%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe89%ReversingLabsByteCode-MSIL.Trojan.Persistence
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exe51%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exe89%ReversingLabsByteCode-MSIL.Trojan.Persistence
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exe51%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exe89%ReversingLabsByteCode-MSIL.Trojan.Persistence

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        25.0.dhcpmon.exe.e50000.0.unpack100%AviraHEUR/AGEN.1118533Download File
        16.0.OjAJYVQ7iK.exe.e60000.0.unpack100%AviraHEUR/AGEN.1118533Download File
        21.0.OjAJYVQ7iK.exe.980000.0.unpack100%AviraHEUR/AGEN.1118533Download File
        25.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.0.dhcpmon.exe.fa0000.0.unpack100%AviraHEUR/AGEN.1118533Download File
        24.0.dhcpmon.exe.b50000.0.unpack100%AviraHEUR/AGEN.1118533Download File
        25.2.dhcpmon.exe.e50000.1.unpack100%AviraHEUR/AGEN.1118533Download File
        1.0.OjAJYVQ7iK.exe.570000.0.unpack100%AviraHEUR/AGEN.1118533Download File

        Domains

        SourceDetectionScannerLabelLink
        ghfsquad.duckdns.org5%VirustotalBrowse
        ludwigh.duckdns.org5%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cners0%Avira URL Cloudsafe
        http://www.sajatypeworks.coma-d#0%Avira URL Cloudsafe
        http://www.sandoll.co.kr/0%Avira URL Cloudsafe
        ghfsquad.duckdns.org0%Avira URL Cloudsafe
        http://www.sandoll.co.krj0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/t0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Verd0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://www.founder.com.cn/cn/0%URL Reputationsafe
        http://en.wg0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn.0%Avira URL Cloudsafe
        http://www.fonts.comcc0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/70%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/70%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/70%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        ludwigh.duckdns.org0%Avira URL Cloudsafe
        http://www.fonts.comic0%URL Reputationsafe
        http://www.fonts.comic0%URL Reputationsafe
        http://www.fonts.comic0%URL Reputationsafe
        http://www.founder.com.cn/cns-cTt0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ana0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
        http://www.founder.com.cn/cn/nX0%Avira URL Cloudsafe
        http://www.tiro.comm0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/(0%URL Reputationsafe
        http://www.fonts.comt0%Avira URL Cloudsafe
        http://www.tiro.comc0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/Micri0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        ghfsquad.duckdns.org
        192.169.69.25
        truetrueunknown
        ludwigh.duckdns.org
        79.134.225.112
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        ghfsquad.duckdns.orgtrue
        • Avira URL Cloud: safe
        unknown
        ludwigh.duckdns.orgtrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.founder.com.cn/cnersOjAJYVQ7iK.exe, 00000001.00000003.195587180.0000000004FF4000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersP?OjAJYVQ7iK.exe, 00000001.00000003.198068340.0000000004FF9000.00000004.00000001.sdmpfalse
          high
          http://www.sajatypeworks.coma-d#OjAJYVQ7iK.exe, 00000001.00000003.194547907.000000000500B000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sandoll.co.kr/OjAJYVQ7iK.exe, 00000001.00000003.195250311.0000000004FF9000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sandoll.co.krjOjAJYVQ7iK.exe, 00000001.00000003.195250311.0000000004FF9000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tiro.comOjAJYVQ7iK.exe, 00000001.00000003.194725696.000000000500B000.00000004.00000001.sdmp, OjAJYVQ7iK.exe, 00000001.00000003.194739543.000000000500B000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designersOjAJYVQ7iK.exe, 00000001.00000003.198423875.0000000004FFD000.00000004.00000001.sdmpfalse
            high
            http://www.jiyu-kobo.co.jp/jp/tOjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fonts.comXOjAJYVQ7iK.exe, 00000001.00000003.194562488.000000000500B000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/VerdOjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.sajatypeworks.comOjAJYVQ7iK.exe, 00000001.00000003.194547907.000000000500B000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/OjAJYVQ7iK.exe, 00000001.00000003.195713949.0000000004FF4000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://en.wgOjAJYVQ7iK.exe, 00000001.00000003.194304933.000000000106D000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.founder.com.cn/cn.OjAJYVQ7iK.exe, 00000001.00000003.195587180.0000000004FF4000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fonts.comccOjAJYVQ7iK.exe, 00000001.00000003.194586100.000000000500B000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/7OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cnOjAJYVQ7iK.exe, 00000001.00000003.195576488.000000000502D000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fonts.comicOjAJYVQ7iK.exe, 00000001.00000003.194586100.000000000500B000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cns-cTtOjAJYVQ7iK.exe, 00000001.00000003.195576488.000000000502D000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/anaOjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/nXOjAJYVQ7iK.exe, 00000001.00000003.195713949.0000000004FF4000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.commOjAJYVQ7iK.exe, 00000001.00000003.194711594.000000000500B000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/(OjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fonts.comOjAJYVQ7iK.exe, 00000001.00000003.194547907.000000000500B000.00000004.00000001.sdmpfalse
              high
              http://www.fonts.comtOjAJYVQ7iK.exe, 00000001.00000003.194562488.000000000500B000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers:OjAJYVQ7iK.exe, 00000001.00000003.198068340.0000000004FF9000.00000004.00000001.sdmpfalse
                high
                http://www.tiro.comcOjAJYVQ7iK.exe, 00000001.00000003.194711594.000000000500B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/MicriOjAJYVQ7iK.exe, 00000001.00000003.196509907.0000000004FF4000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                79.134.225.112
                ludwigh.duckdns.orgSwitzerland
                6775FINK-TELECOM-SERVICESCHtrue
                192.169.69.25
                ghfsquad.duckdns.orgUnited States
                23033WOWUStrue

                Private

                IP
                192.168.2.1

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:385025
                Start date:11.04.2021
                Start time:09:01:13
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 35s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:OjAJYVQ7iK.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:34
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@14/8@28/3
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 0.6% (good quality ratio 0%)
                • Quality average: 0%
                • Quality standard deviation: 0%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 44
                • Number of non-executed functions: 2
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 13.64.90.137, 52.147.198.201, 168.61.161.212, 104.43.193.48, 52.255.188.83, 20.50.102.62, 23.54.113.104, 23.0.174.185, 23.0.174.200, 23.10.249.26, 23.10.249.43, 52.155.217.156
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                09:03:10AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                09:03:11API Interceptor351x Sleep call for process: OjAJYVQ7iK.exe modified
                09:03:12Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\OjAJYVQ7iK.exe" s>$(Arg0)
                09:03:13Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                79.134.225.112Purchase Order Confirmation.exeGet hashmaliciousBrowse
                  JOIN DOO ORDER.exeGet hashmaliciousBrowse
                    192.169.69.25ttmPnejtED.jsGet hashmaliciousBrowse
                    • pluginsrv.duckdns.org:7744/is-ready
                    New Order.xlsxGet hashmaliciousBrowse
                    • systemserverrootmapforfiletrn.duckdns.org/explorer/black.exe
                    Your Transport Plan has Changed - Maersk.xlsxGet hashmaliciousBrowse
                    • covidinternationalspreadsoomuchtruehead.duckdns.org/covid/blk.exe
                    XQqVczq7eQ.exeGet hashmaliciousBrowse
                    • wetransferfax.duckdns.org/sftp.exe
                    http://office365update.duckdns.orgGet hashmaliciousBrowse
                    • office365update.duckdns.org/
                    TUdme7rF2G.rtfGet hashmaliciousBrowse
                    • wsdykungcommunicationtarisupliermg55gms.duckdns.org/kungdoc/winlog.exe
                    http://communicationideadedicatedserversystem.duckdns.org/bns/vbc.exeGet hashmaliciousBrowse
                    • communicationideadedicatedserversystem.duckdns.org/bns/vbc.exe
                    doc04483720200602121810.xlsxGet hashmaliciousBrowse
                    • honeysposecurityfileexchangeservice.duckdns.org/org/vbc.exe
                    doc04483720200602121810.xlsxGet hashmaliciousBrowse
                    • honeysposecurityfileexchangeservice.duckdns.org/org/vbc.exe
                    BBVA-Confirming Facturas Pagadas al Vencimiento.xlsxGet hashmaliciousBrowse
                    • mkpksb2overhypetheykillppelforlifehelgg.duckdns.org/mkpk2doc/regasm.exe
                    VqtnFLslNj_Purchase Order.vbsGet hashmaliciousBrowse
                    • onyeeze.duckdns.org:5000/is-ready
                    1.bin.jsGet hashmaliciousBrowse
                    • unknownsoft.duckdns.org:7755/is-ready
                    Doc1.mhtGet hashmaliciousBrowse
                    • pluginsrv2.duckdns.org:8899/is-ready
                    https://cdn.discordapp.com/attachments/692273473430749187/695380419897458718/RFQ.tar.gzGet hashmaliciousBrowse
                    • pluginsrv2.duckdns.org:8000/is-ready
                    http://systemserverrootmapforfiletrn.duckdns.org/explorer/black.exeGet hashmaliciousBrowse
                    • systemserverrootmapforfiletrn.duckdns.org/explorer/black.exe
                    help.wsfGet hashmaliciousBrowse
                    • postventa-vodafone.duckdns.org/is-ready
                    order.xlsxGet hashmaliciousBrowse
                    • windowsfirewallsecurityauthorise.duckdns.org/big/svch.html
                    order.xlsxGet hashmaliciousBrowse
                    • windowsfirewallsecurityauthorise.duckdns.org/big/svch.html
                    54RFQ EU (190926) CRYPTED.jsGet hashmaliciousBrowse
                    • pluginsrv1.duckdns.org:7757/is-ready
                    5Hb61XJTf8.jarGet hashmaliciousBrowse
                    • pluginsrv1.duckdns.org:7757/is-ready

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    WOWUS1FC9626D978197A611B62BF796D472A6F8AB372E70DDF.exeGet hashmaliciousBrowse
                    • 192.169.69.26
                    A4816D4FECD6D2806D5B105C3AAB55F4A1EB5DEB3B126.exeGet hashmaliciousBrowse
                    • 192.169.69.26
                    qnJXJsqt1M.exeGet hashmaliciousBrowse
                    • 192.169.69.26
                    1RkccAiQMy.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    NaHU7wO2Wf.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    hQtNCi8128.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    FB11.exeGet hashmaliciousBrowse
                    • 216.244.74.42
                    CDFCB9455FC457AC23BE82004BDCF4120E3C8D6FD2918.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    EUjk8F87b8.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    MglhrJiLUL.exeGet hashmaliciousBrowse
                    • 192.169.69.26
                    On35KJkYT4.exeGet hashmaliciousBrowse
                    • 192.169.69.26
                    ORDER-0319.pdf.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    ORDER-21031566AF.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    ttmPnejtED.jsGet hashmaliciousBrowse
                    • 192.169.69.25
                    3Ad4ZKWT0L.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    EbJIveZLAv.exeGet hashmaliciousBrowse
                    • 192.169.69.26
                    Order_List.xlsxGet hashmaliciousBrowse
                    • 192.169.69.26
                    payload3.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    ORDER-02108 xls.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    ORDER #0206.exeGet hashmaliciousBrowse
                    • 192.169.69.25
                    FINK-TELECOM-SERVICESCHTSskTqG9V9.exeGet hashmaliciousBrowse
                    • 79.134.225.30
                    Files Specification.xlsxGet hashmaliciousBrowse
                    • 79.134.225.30
                    J62DQ7fO0b.exeGet hashmaliciousBrowse
                    • 79.134.225.30
                    oE6O5K1emC.exeGet hashmaliciousBrowse
                    • 79.134.225.30
                    zunUbtZ2Y3.exeGet hashmaliciousBrowse
                    • 79.134.225.40
                    EASTERS.exeGet hashmaliciousBrowse
                    • 79.134.225.118
                    LIST OF POEA DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                    • 79.134.225.9
                    AWB.pdf.exeGet hashmaliciousBrowse
                    • 79.134.225.102
                    AIC7VMxudf.exeGet hashmaliciousBrowse
                    • 79.134.225.30
                    9mm case for ROYAL METAL INDUSTRIES 3milmonth Specification drawings.exeGet hashmaliciousBrowse
                    • 79.134.225.21
                    PO50164.exeGet hashmaliciousBrowse
                    • 79.134.225.79
                    Fast color scan to a PDFfile_1_20210331084231346.pdf.exeGet hashmaliciousBrowse
                    • 79.134.225.102
                    n7dIHuG3v6.exeGet hashmaliciousBrowse
                    • 79.134.225.92
                    F6JT4fXIAQ.exeGet hashmaliciousBrowse
                    • 79.134.225.92
                    order_inquiry2094.xls.exeGet hashmaliciousBrowse
                    • 79.134.225.102
                    5H957qLghX.exeGet hashmaliciousBrowse
                    • 79.134.225.25
                    yBio5dWAOl.exeGet hashmaliciousBrowse
                    • 79.134.225.7
                    wDIaJji4Vv.exeGet hashmaliciousBrowse
                    • 79.134.225.7
                    DkZY1k3y9F.exeGet hashmaliciousBrowse
                    • 79.134.225.23
                    hbvo9thTAX.exeGet hashmaliciousBrowse
                    • 79.134.225.7

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Process:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):418304
                    Entropy (8bit):7.933921685316817
                    Encrypted:false
                    SSDEEP:6144:akoMdtpU20db9m2HuW5G2u0NvHmVX0khUf8WbtXxB5Ojxqe6+j0m5Y:akzlWu0N+Af8OXpO17A
                    MD5:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    SHA1:44A01528433887323F7CD6495387AD189252D72D
                    SHA-256:9829C2298AB32875E7379274C578FCBFFCDDAA36A262C74F69D113217913E5CA
                    SHA-512:15D51363CC6A2E448DAE680A64707F8E9732992E916F966C8583B719CE9454E8D9BB364356907F666673A2EC2872F4253751E327BAD72FBE69DFDEFEAFFD573F
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Metadefender, Detection: 51%, Browse
                    • Antivirus: ReversingLabs, Detection: 89%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..............0..X...........v... ........@.. ....................................@.................................Pv..K.................................................................................... ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............`..............@..B.................v......H........K...*...........I...............................................0..........*....0...........(....*..0...........(.....(....*....0...........(....*..0................%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......*..0..........s"........8.... .R...... .y1X ....a ...d ..B.YX .[S. .... .,.XZY Q..\Z I..1f b..q .s..aeeXa @..= ....af .=.. ....eZYfeaa S..J .a. e .~.. .*..Ya 1.|.Xafa .=
                    C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):525
                    Entropy (8bit):5.2874233355119316
                    Encrypted:false
                    SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                    MD5:61CCF53571C9ABA6511D696CB0D32E45
                    SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                    SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                    SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                    C:\Users\user\AppData\Local\Temp\tmp691F.tmp
                    Process:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1300
                    Entropy (8bit):5.132166972547854
                    Encrypted:false
                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Hxtn:cbk4oL600QydbQxIYODOLedq3wj
                    MD5:D93A57D549AA03755BEF9B5AB70F8765
                    SHA1:7D9E6AA25A97F334349173FF9C32CA635F6E6CD1
                    SHA-256:52D72D1AF0AB2D125603529108AACE2FEED0E8D26286E1F1989C97A0629F88A7
                    SHA-512:2666D70F97801BC9D07B96528DACC4962263896E9F6E22B46572EEAFAAA409096FC4BA89C4F3DEAF8D4C94BCAF415E0E6695ACCEA97A960303139CD1F31ABF30
                    Malicious:true
                    Reputation:low
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                    C:\Users\user\AppData\Local\Temp\tmp6C3D.tmp
                    Process:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1310
                    Entropy (8bit):5.109425792877704
                    Encrypted:false
                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                    MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                    SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                    SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                    SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                    Process:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):8
                    Entropy (8bit):3.0
                    Encrypted:false
                    SSDEEP:3:Tdm4n:9
                    MD5:4D6613AC2CE40C13C7EBEA2D8595F1B9
                    SHA1:3A948AAA215B9952A8B9E276F6DA3D70F05794B9
                    SHA-256:3232EDB50BFEB4EB38E7A6776D4C8BADF53B3F35E815898EEB235589F43B21A0
                    SHA-512:F3C577A4883C6C848DCA3144757E163F3B7D421222B6EFAAFE008B29AE3089D3CF797E20EE45B5491571D2BD5859A33B4FB9E128803F4DE8764E2F5ED0BA5B91
                    Malicious:true
                    Reputation:low
                    Preview: \.M...H
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                    Process:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):37
                    Entropy (8bit):4.59445640611102
                    Encrypted:false
                    SSDEEP:3:oNWXp5vqP3AdAn:oNWXpFqPwdA
                    MD5:0EC34671363D574D0987FCB496CE9834
                    SHA1:8C11DE2D2A58721605F56AE0A51AABAEAA236713
                    SHA-256:2F573ADB61920142AAECBD7765C2759CC79E1C06F6CA3C912749B3415340D4CB
                    SHA-512:206863D05A766EA050D2B14BE32557457C32E0F926AEE7F479F60967BB0EA903A79DA3534A110B85B9C7F6D6F2279067776C80FD91FC130416051328C396CA99
                    Malicious:false
                    Reputation:low
                    Preview: C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\hTwyiugpwdBi.exe
                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):418304
                    Entropy (8bit):7.933921685316817
                    Encrypted:false
                    SSDEEP:6144:akoMdtpU20db9m2HuW5G2u0NvHmVX0khUf8WbtXxB5Ojxqe6+j0m5Y:akzlWu0N+Af8OXpO17A
                    MD5:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    SHA1:44A01528433887323F7CD6495387AD189252D72D
                    SHA-256:9829C2298AB32875E7379274C578FCBFFCDDAA36A262C74F69D113217913E5CA
                    SHA-512:15D51363CC6A2E448DAE680A64707F8E9732992E916F966C8583B719CE9454E8D9BB364356907F666673A2EC2872F4253751E327BAD72FBE69DFDEFEAFFD573F
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Metadefender, Detection: 51%, Browse
                    • Antivirus: ReversingLabs, Detection: 89%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..............0..X...........v... ........@.. ....................................@.................................Pv..K.................................................................................... ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............`..............@..B.................v......H........K...*...........I...............................................0..........*....0...........(....*..0...........(.....(....*....0...........(....*..0................%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......*..0..........s"........8.... .R...... .y1X ....a ...d ..B.YX .[S. .... .,.XZY Q..\Z I..1f b..q .s..aeeXa @..= ....af .=.. ....eZYfeaa S..J .a. e .~.. .*..Ya 1.|.Xafa .=
                    C:\Users\user\AppData\Roaming\UB0ea31R2rvgUZ7l\mOcj0RclyeUq.exe
                    Process:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):418304
                    Entropy (8bit):7.933921685316817
                    Encrypted:false
                    SSDEEP:6144:akoMdtpU20db9m2HuW5G2u0NvHmVX0khUf8WbtXxB5Ojxqe6+j0m5Y:akzlWu0N+Af8OXpO17A
                    MD5:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    SHA1:44A01528433887323F7CD6495387AD189252D72D
                    SHA-256:9829C2298AB32875E7379274C578FCBFFCDDAA36A262C74F69D113217913E5CA
                    SHA-512:15D51363CC6A2E448DAE680A64707F8E9732992E916F966C8583B719CE9454E8D9BB364356907F666673A2EC2872F4253751E327BAD72FBE69DFDEFEAFFD573F
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Metadefender, Detection: 51%, Browse
                    • Antivirus: ReversingLabs, Detection: 89%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..............0..X...........v... ........@.. ....................................@.................................Pv..K.................................................................................... ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............`..............@..B.................v......H........K...*...........I...............................................0..........*....0...........(....*..0...........(.....(....*....0...........(....*..0................%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......%.~....%-.&~..........s....%......*..0..........s"........8.... .R...... .y1X ....a ...d ..B.YX .[S. .... .,.XZY Q..\Z I..1f b..q .s..aeeXa @..= ....af .=.. ....eZYfeaa S..J .a. e .~.. .*..Ya 1.|.Xafa .=

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.933921685316817
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:OjAJYVQ7iK.exe
                    File size:418304
                    MD5:d7d3373ffbd938da6c7c8aa3dc57fa49
                    SHA1:44a01528433887323f7cd6495387ad189252d72d
                    SHA256:9829c2298ab32875e7379274c578fcbffcddaa36a262c74f69d113217913e5ca
                    SHA512:15d51363cc6a2e448dae680a64707f8e9732992e916f966c8583b719ce9454e8d9bb364356907f666673a2ec2872f4253751e327bad72fbe69dfdefeaffd573f
                    SSDEEP:6144:akoMdtpU20db9m2HuW5G2u0NvHmVX0khUf8WbtXxB5Ojxqe6+j0m5Y:akzlWu0N+Af8OXpO17A
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......]..............0..X...........v... ........@.. ....................................@................................

                    File Icon

                    Icon Hash:00828e8e8686b000

                    Static PE Info

                    General

                    Entrypoint:0x46769e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x5D8693DB [Sat Sep 21 21:19:23 2019 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v2.0.50727
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x676500x4b.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x680000x5c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6a0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x656a40x65800False0.953658982451data7.94150093697IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0x680000x5c80x600False0.420572916667data4.15341986668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x6a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_VERSION0x680a00x32cdata
                    RT_MANIFEST0x683cc0x1f5XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright XZ2Studio 2019
                    Assembly Version1.0.0.0
                    InternalNameXZ2Studio.exe
                    FileVersion1.0.0.0
                    CompanyName
                    LegalTrademarks
                    Comments
                    ProductNameXZ2Studio
                    ProductVersion1.0.0.0
                    FileDescriptionXZ2Studio
                    OriginalFilenameXZ2Studio.exe

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    04/11/21-09:03:32.697333TCP2025019ET TROJAN Possible NanoCore C2 60B497338192192.168.2.3192.169.69.25
                    04/11/21-09:03:38.116050TCP2025019ET TROJAN Possible NanoCore C2 60B497348192192.168.2.3192.169.69.25
                    04/11/21-09:03:42.824744TCP2025019ET TROJAN Possible NanoCore C2 60B497368192192.168.2.3192.169.69.25
                    04/11/21-09:04:14.335443TCP2025019ET TROJAN Possible NanoCore C2 60B497488192192.168.2.3192.169.69.25
                    04/11/21-09:04:20.360727TCP2025019ET TROJAN Possible NanoCore C2 60B497498192192.168.2.3192.169.69.25
                    04/11/21-09:04:29.937443TCP2025019ET TROJAN Possible NanoCore C2 60B497508192192.168.2.3192.169.69.25
                    04/11/21-09:04:56.151996TCP2025019ET TROJAN Possible NanoCore C2 60B497548192192.168.2.3192.169.69.25
                    04/11/21-09:05:01.123504TCP2025019ET TROJAN Possible NanoCore C2 60B497558192192.168.2.3192.169.69.25
                    04/11/21-09:05:05.501084TCP2025019ET TROJAN Possible NanoCore C2 60B497568192192.168.2.3192.169.69.25
                    04/11/21-09:05:26.396553TCP2025019ET TROJAN Possible NanoCore C2 60B497608192192.168.2.3192.169.69.25
                    04/11/21-09:05:31.020458TCP2025019ET TROJAN Possible NanoCore C2 60B497618192192.168.2.3192.169.69.25
                    04/11/21-09:05:35.440855TCP2025019ET TROJAN Possible NanoCore C2 60B497628192192.168.2.3192.169.69.25

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 11, 2021 09:03:13.525330067 CEST497308192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:13.556582928 CEST81924973079.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:14.137969017 CEST497308192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:14.171170950 CEST81924973079.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:14.747070074 CEST497308192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:14.778476000 CEST81924973079.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:19.319617987 CEST497318192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:19.351015091 CEST81924973179.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:19.950701952 CEST497318192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:19.982353926 CEST81924973179.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:20.638194084 CEST497318192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:20.669919968 CEST81924973179.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:25.213694096 CEST497328192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:25.244803905 CEST81924973279.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:25.747998953 CEST497328192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:25.779243946 CEST81924973279.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:26.453629971 CEST497328192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:26.486504078 CEST81924973279.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:32.098365068 CEST497338192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:32.305557013 CEST819249733192.169.69.25192.168.2.3
                    Apr 11, 2021 09:03:32.308167934 CEST497338192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:32.697333097 CEST497338192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:32.903028011 CEST819249733192.169.69.25192.168.2.3
                    Apr 11, 2021 09:03:37.880736113 CEST497348192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:38.115262985 CEST819249734192.169.69.25192.168.2.3
                    Apr 11, 2021 09:03:38.115360975 CEST497348192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:38.116050005 CEST497348192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:38.329561949 CEST819249734192.169.69.25192.168.2.3
                    Apr 11, 2021 09:03:42.579906940 CEST497368192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:42.824110985 CEST819249736192.169.69.25192.168.2.3
                    Apr 11, 2021 09:03:42.824229002 CEST497368192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:42.824743986 CEST497368192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:03:43.014324903 CEST819249736192.169.69.25192.168.2.3
                    Apr 11, 2021 09:03:47.243073940 CEST497378192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:47.277245045 CEST81924973779.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:47.952879906 CEST497378192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:47.985168934 CEST81924973779.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:48.640487909 CEST497378192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:48.672172070 CEST81924973779.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:52.742803097 CEST497388192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:52.774352074 CEST81924973879.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:53.453830004 CEST497388192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:53.486609936 CEST81924973879.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:54.141046047 CEST497388192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:54.172543049 CEST81924973879.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:58.531819105 CEST497418192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:58.563457012 CEST81924974179.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:59.141422033 CEST497418192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:59.172787905 CEST81924974179.134.225.112192.168.2.3
                    Apr 11, 2021 09:03:59.750776052 CEST497418192192.168.2.379.134.225.112
                    Apr 11, 2021 09:03:59.781976938 CEST81924974179.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:14.143338919 CEST497488192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:14.334758043 CEST819249748192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:14.335143089 CEST497488192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:14.335443020 CEST497488192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:14.550884008 CEST819249748192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:20.143529892 CEST497498192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:20.360270023 CEST819249749192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:20.360425949 CEST497498192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:20.360727072 CEST497498192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:20.556380033 CEST819249749192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:29.706922054 CEST497508192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:29.936815023 CEST819249750192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:29.937164068 CEST497508192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:29.937443018 CEST497508192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:30.134644985 CEST819249750192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:39.381154060 CEST497518192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:39.412664890 CEST81924975179.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:39.957245111 CEST497518192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:39.989371061 CEST81924975179.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:40.644850969 CEST497518192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:40.676879883 CEST81924975179.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:44.876153946 CEST497528192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:44.907202005 CEST81924975279.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:45.457695961 CEST497528192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:45.488878012 CEST81924975279.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:46.145287991 CEST497528192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:46.179236889 CEST81924975279.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:50.373560905 CEST497538192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:50.406244993 CEST81924975379.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:50.958172083 CEST497538192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:50.991410017 CEST81924975379.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:51.645911932 CEST497538192192.168.2.379.134.225.112
                    Apr 11, 2021 09:04:51.677409887 CEST81924975379.134.225.112192.168.2.3
                    Apr 11, 2021 09:04:55.906994104 CEST497548192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:56.151336908 CEST819249754192.169.69.25192.168.2.3
                    Apr 11, 2021 09:04:56.151650906 CEST497548192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:56.151995897 CEST497548192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:04:56.368913889 CEST819249754192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:00.895567894 CEST497558192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:01.122921944 CEST819249755192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:01.123106956 CEST497558192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:01.123503923 CEST497558192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:01.317758083 CEST819249755192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:05.333705902 CEST497568192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:05.500477076 CEST819249756192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:05.500689983 CEST497568192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:05.501084089 CEST497568192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:05.723125935 CEST819249756192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:09.740118980 CEST497578192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:09.771760941 CEST81924975779.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:10.459702969 CEST497578192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:10.493932009 CEST81924975779.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:11.147360086 CEST497578192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:11.180696011 CEST81924975779.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:15.241921902 CEST497588192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:15.275007010 CEST81924975879.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:15.960218906 CEST497588192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:15.991909027 CEST81924975879.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:16.647722960 CEST497588192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:16.679163933 CEST81924975879.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:20.741727114 CEST497598192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:20.773014069 CEST81924975979.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:21.460716009 CEST497598192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:21.494317055 CEST81924975979.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:22.148291111 CEST497598192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:22.180356026 CEST81924975979.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:26.212662935 CEST497608192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:26.396025896 CEST819249760192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:26.396348953 CEST497608192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:26.396553040 CEST497608192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:26.596467972 CEST819249760192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:30.787168980 CEST497618192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:31.019920111 CEST819249761192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:31.020019054 CEST497618192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:31.020457983 CEST497618192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:31.223561049 CEST819249761192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:35.245776892 CEST497628192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:35.440335035 CEST819249762192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:35.440665960 CEST497628192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:35.440855026 CEST497628192192.168.2.3192.169.69.25
                    Apr 11, 2021 09:05:35.642623901 CEST819249762192.169.69.25192.168.2.3
                    Apr 11, 2021 09:05:39.833789110 CEST497638192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:39.866419077 CEST81924976379.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:40.524745941 CEST497638192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:40.556133032 CEST81924976379.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:41.212321043 CEST497638192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:41.244045019 CEST81924976379.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:45.475887060 CEST497648192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:45.508683920 CEST81924976479.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:46.025248051 CEST497648192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:46.056936026 CEST81924976479.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:46.712840080 CEST497648192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:46.744010925 CEST81924976479.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:50.792637110 CEST497658192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:50.824213982 CEST81924976579.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:51.527962923 CEST497658192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:51.561881065 CEST81924976579.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:52.216049910 CEST497658192192.168.2.379.134.225.112
                    Apr 11, 2021 09:05:52.247497082 CEST81924976579.134.225.112192.168.2.3
                    Apr 11, 2021 09:05:56.462459087 CEST497668192192.168.2.3192.169.69.25

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 11, 2021 09:01:51.001543999 CEST6493853192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:51.016609907 CEST53649388.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:51.985474110 CEST6015253192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:51.998068094 CEST53601528.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:54.442686081 CEST5754453192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:54.455429077 CEST53575448.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:55.406850100 CEST5598453192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:55.421691895 CEST53559848.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:56.403810978 CEST6418553192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:56.417076111 CEST53641858.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:57.937777996 CEST6511053192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:57.950561047 CEST53651108.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:59.105138063 CEST5836153192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:59.117631912 CEST53583618.8.8.8192.168.2.3
                    Apr 11, 2021 09:01:59.937426090 CEST6349253192.168.2.38.8.8.8
                    Apr 11, 2021 09:01:59.950126886 CEST53634928.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:01.100388050 CEST6083153192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:01.112405062 CEST53608318.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:01.929836035 CEST6010053192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:01.942621946 CEST53601008.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:02.779949903 CEST5319553192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:02.793458939 CEST53531958.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:03.586522102 CEST5014153192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:03.601074934 CEST53501418.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:11.317183018 CEST5302353192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:11.329839945 CEST53530238.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:15.333024979 CEST4956353192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:15.346276045 CEST53495638.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:16.075911045 CEST5135253192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:16.089235067 CEST53513528.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:16.845942020 CEST5934953192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:16.874038935 CEST53593498.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:21.565097094 CEST5708453192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:21.579391956 CEST53570848.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:28.470307112 CEST5882353192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:28.483464003 CEST53588238.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:31.172571898 CEST5756853192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:31.190458059 CEST53575688.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:46.879281044 CEST5054053192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:46.898739100 CEST53505408.8.8.8192.168.2.3
                    Apr 11, 2021 09:02:54.474730968 CEST5436653192.168.2.38.8.8.8
                    Apr 11, 2021 09:02:54.489046097 CEST53543668.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:10.427225113 CEST5303453192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:10.446085930 CEST53530348.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:13.329710007 CEST5776253192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:13.510900021 CEST53577628.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:19.095187902 CEST5543553192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:19.282011032 CEST53554358.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:24.942365885 CEST5071353192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:25.126991034 CEST53507138.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:31.888231993 CEST5613253192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:32.069762945 CEST53561328.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:37.822982073 CEST5898753192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:37.837412119 CEST53589878.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:42.392299891 CEST5657953192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:42.576694965 CEST53565798.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:47.061103106 CEST6063353192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:47.242060900 CEST53606338.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:52.726169109 CEST6129253192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:52.741607904 CEST53612928.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:56.728641033 CEST6361953192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:56.839498043 CEST53636198.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:57.806426048 CEST6493853192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:57.986140013 CEST53649388.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:58.475516081 CEST6194653192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:58.516133070 CEST6491053192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:58.529424906 CEST53649108.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:58.586220026 CEST53619468.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:58.957226038 CEST5212353192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:58.973332882 CEST53521238.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:59.451683998 CEST5613053192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:59.466468096 CEST53561308.8.8.8192.168.2.3
                    Apr 11, 2021 09:03:59.927014112 CEST5633853192.168.2.38.8.8.8
                    Apr 11, 2021 09:03:59.939830065 CEST53563388.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:00.297306061 CEST5942053192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:00.310129881 CEST53594208.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:01.261435032 CEST5878453192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:01.403517008 CEST53587848.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:09.049372911 CEST6397853192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:09.229743958 CEST53639788.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:18.565850973 CEST6293853192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:18.579432964 CEST53629388.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:24.565968990 CEST5570853192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:24.579590082 CEST53557088.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:34.144870043 CEST5680353192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:34.328341961 CEST53568038.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:44.692733049 CEST5714553192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:44.875530958 CEST53571458.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:50.193170071 CEST5535953192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:50.372935057 CEST53553598.8.8.8192.168.2.3
                    Apr 11, 2021 09:04:55.725264072 CEST5830653192.168.2.38.8.8.8
                    Apr 11, 2021 09:04:55.906214952 CEST53583068.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:00.381469965 CEST6412453192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:00.894798040 CEST53641248.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:05.319425106 CEST4936153192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:05.333096027 CEST53493618.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:09.726361036 CEST6315053192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:09.739528894 CEST53631508.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:15.226532936 CEST5327953192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:15.241305113 CEST53532798.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:20.727413893 CEST5688153192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:20.741077900 CEST53568818.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:26.196145058 CEST5364253192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:26.211993933 CEST53536428.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:30.602714062 CEST5566753192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:30.786562920 CEST53556678.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:35.228240967 CEST5483353192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:35.245070934 CEST53548338.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:39.650465012 CEST6247653192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:39.833180904 CEST53624768.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:45.291413069 CEST4970553192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:45.475127935 CEST53497058.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:50.779489040 CEST6147753192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:50.792150974 CEST53614778.8.8.8192.168.2.3
                    Apr 11, 2021 09:05:56.277096987 CEST6163353192.168.2.38.8.8.8
                    Apr 11, 2021 09:05:56.461711884 CEST53616338.8.8.8192.168.2.3

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Apr 11, 2021 09:03:13.329710007 CEST192.168.2.38.8.8.80xe04cStandard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:19.095187902 CEST192.168.2.38.8.8.80xed0eStandard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:24.942365885 CEST192.168.2.38.8.8.80x8990Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:31.888231993 CEST192.168.2.38.8.8.80x8032Standard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:37.822982073 CEST192.168.2.38.8.8.80x6e72Standard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:42.392299891 CEST192.168.2.38.8.8.80x1dabStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:47.061103106 CEST192.168.2.38.8.8.80xe1f3Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:52.726169109 CEST192.168.2.38.8.8.80x2c02Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:58.516133070 CEST192.168.2.38.8.8.80x8b7Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:09.049372911 CEST192.168.2.38.8.8.80xb04dStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:18.565850973 CEST192.168.2.38.8.8.80x5b4eStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:24.565968990 CEST192.168.2.38.8.8.80x28aeStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:34.144870043 CEST192.168.2.38.8.8.80x48f5Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:44.692733049 CEST192.168.2.38.8.8.80xf89dStandard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:50.193170071 CEST192.168.2.38.8.8.80x30f8Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:55.725264072 CEST192.168.2.38.8.8.80x1d48Standard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:00.381469965 CEST192.168.2.38.8.8.80x76bcStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:05.319425106 CEST192.168.2.38.8.8.80xf720Standard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:09.726361036 CEST192.168.2.38.8.8.80x7833Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:15.226532936 CEST192.168.2.38.8.8.80x2c65Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:20.727413893 CEST192.168.2.38.8.8.80x2488Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:26.196145058 CEST192.168.2.38.8.8.80x466cStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:30.602714062 CEST192.168.2.38.8.8.80x89f4Standard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:35.228240967 CEST192.168.2.38.8.8.80xf1fStandard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:39.650465012 CEST192.168.2.38.8.8.80x4bc6Standard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:45.291413069 CEST192.168.2.38.8.8.80xfebStandard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:50.779489040 CEST192.168.2.38.8.8.80x590dStandard query (0)ludwigh.duckdns.orgA (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:56.277096987 CEST192.168.2.38.8.8.80x63f5Standard query (0)ghfsquad.duckdns.orgA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Apr 11, 2021 09:03:13.510900021 CEST8.8.8.8192.168.2.30xe04cNo error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:19.282011032 CEST8.8.8.8192.168.2.30xed0eNo error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:25.126991034 CEST8.8.8.8192.168.2.30x8990No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:32.069762945 CEST8.8.8.8192.168.2.30x8032No error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:37.837412119 CEST8.8.8.8192.168.2.30x6e72No error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:42.576694965 CEST8.8.8.8192.168.2.30x1dabNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:47.242060900 CEST8.8.8.8192.168.2.30xe1f3No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:52.741607904 CEST8.8.8.8192.168.2.30x2c02No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:03:58.529424906 CEST8.8.8.8192.168.2.30x8b7No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:09.229743958 CEST8.8.8.8192.168.2.30xb04dNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:18.579432964 CEST8.8.8.8192.168.2.30x5b4eNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:24.579590082 CEST8.8.8.8192.168.2.30x28aeNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:34.328341961 CEST8.8.8.8192.168.2.30x48f5No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:44.875530958 CEST8.8.8.8192.168.2.30xf89dNo error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:50.372935057 CEST8.8.8.8192.168.2.30x30f8No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:04:55.906214952 CEST8.8.8.8192.168.2.30x1d48No error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:00.894798040 CEST8.8.8.8192.168.2.30x76bcNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:05.333096027 CEST8.8.8.8192.168.2.30xf720No error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:09.739528894 CEST8.8.8.8192.168.2.30x7833No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:15.241305113 CEST8.8.8.8192.168.2.30x2c65No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:20.741077900 CEST8.8.8.8192.168.2.30x2488No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:26.211993933 CEST8.8.8.8192.168.2.30x466cNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:30.786562920 CEST8.8.8.8192.168.2.30x89f4No error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:35.245070934 CEST8.8.8.8192.168.2.30xf1fNo error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:39.833180904 CEST8.8.8.8192.168.2.30x4bc6No error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:45.475127935 CEST8.8.8.8192.168.2.30xfebNo error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:50.792150974 CEST8.8.8.8192.168.2.30x590dNo error (0)ludwigh.duckdns.org79.134.225.112A (IP address)IN (0x0001)
                    Apr 11, 2021 09:05:56.461711884 CEST8.8.8.8192.168.2.30x63f5No error (0)ghfsquad.duckdns.org192.169.69.25A (IP address)IN (0x0001)

                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:09:01:57
                    Start date:11/04/2021
                    Path:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\OjAJYVQ7iK.exe'
                    Imagebase:0x570000
                    File size:418304 bytes
                    MD5 hash:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:low

                    General

                    Start time:09:03:08
                    Start date:11/04/2021
                    Path:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    Imagebase:0xe60000
                    File size:418304 bytes
                    MD5 hash:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:low

                    General

                    Start time:09:03:10
                    Start date:11/04/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp691F.tmp'
                    Imagebase:0x230000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:09:03:10
                    Start date:11/04/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6b2800000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:09:03:11
                    Start date:11/04/2021
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6C3D.tmp'
                    Imagebase:0x230000
                    File size:185856 bytes
                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:09:03:11
                    Start date:11/04/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6b2800000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:09:03:12
                    Start date:11/04/2021
                    Path:C:\Users\user\Desktop\OjAJYVQ7iK.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\OjAJYVQ7iK.exe 0
                    Imagebase:0x980000
                    File size:418304 bytes
                    MD5 hash:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:low

                    General

                    Start time:09:03:13
                    Start date:11/04/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                    Imagebase:0xfa0000
                    File size:418304 bytes
                    MD5 hash:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 51%, Metadefender, Browse
                    • Detection: 89%, ReversingLabs
                    Reputation:low

                    General

                    Start time:09:03:19
                    Start date:11/04/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                    Imagebase:0xb50000
                    File size:418304 bytes
                    MD5 hash:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:low

                    General

                    Start time:09:03:33
                    Start date:11/04/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Imagebase:0xe50000
                    File size:418304 bytes
                    MD5 hash:D7D3373FFBD938DA6C7C8AA3DC57FA49
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.423134588.0000000004621000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.421572574.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.423095541.0000000003621000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >

                      Executed Functions

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b92b0218c1908b3f7a63ccea255ff9ff354f7953e5aadb127d3fd238722edb74
                      • Instruction ID: fb71fb5381f55ccc3d37fc5f8b18637462a3c015e841d09aaa6e0c595ca8a621
                      • Opcode Fuzzy Hash: b92b0218c1908b3f7a63ccea255ff9ff354f7953e5aadb127d3fd238722edb74
                      • Instruction Fuzzy Hash: AD12CEB0A24316CFCB24CF29C5806ADBBF6FF86304F19896AD416DB244EB759C85CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49134816ab75ce4c2332979d18aafee1c5d9c6fb8dd0f3c60ffd67523362bfdd
                      • Instruction ID: 91804711b492786a59ce1c66fe7383c313ab7c6dcb6608ff7ae6956d1aed9e0c
                      • Opcode Fuzzy Hash: 49134816ab75ce4c2332979d18aafee1c5d9c6fb8dd0f3c60ffd67523362bfdd
                      • Instruction Fuzzy Hash: 2081BC76F101159BD718DB69C880AAEBBF3AFC9310F2A8079E506EB355DE71DD418B80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: X1kr$X1kr$X1kr$X1kr
                      • API String ID: 0-2451847431
                      • Opcode ID: 19c93f83253e6c788315877995d3db4f079b80cb9d59e17a6c630ac119a16509
                      • Instruction ID: fe2fe7df7562d2369fff85b700f0f29c0e6a2270c5e86a67d0b17cebf43c3777
                      • Opcode Fuzzy Hash: 19c93f83253e6c788315877995d3db4f079b80cb9d59e17a6c630ac119a16509
                      • Instruction Fuzzy Hash: 3441D731B00205DFCB14DFA8D454AAEBBF6FF85304F2581A5E5069B7A0DB71AC06CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: :@Dr$`5kr
                      • API String ID: 0-2548079215
                      • Opcode ID: 661ff22cddba049ab4a304846e748e448c3d006de7b8daefaba70ede1eb14879
                      • Instruction ID: 20754fdfae882bf2c6e4ac9eeae7bf0ce2df92505fd432aaf75f51f16a032d34
                      • Opcode Fuzzy Hash: 661ff22cddba049ab4a304846e748e448c3d006de7b8daefaba70ede1eb14879
                      • Instruction Fuzzy Hash: A5817270B152058FDB08DB68C45076E7BE6BFCA710F18806ED506EB391DE759C42CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: $>_Ir
                      • API String ID: 0-1787506450
                      • Opcode ID: 7e0e9162bb1b7b9f47e109a333bf0c9e9635d248b561f88450874bd32c4d6085
                      • Instruction ID: fef175f32bf3f524322cc09669be891e9e2000ed8706a6086a38d282144fd846
                      • Opcode Fuzzy Hash: 7e0e9162bb1b7b9f47e109a333bf0c9e9635d248b561f88450874bd32c4d6085
                      • Instruction Fuzzy Hash: 7A41C4B1E25315CFCB14CF69C8415BEB762EBCA314B29C87AC416DB605C675F8828BC1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: $ghr
                      • API String ID: 0-1352911727
                      • Opcode ID: 6bef0ccae2089935d190e8b9360ad9332fc181315f02a195d2bec06df2ccc5e7
                      • Instruction ID: 3dc5a99a7310ebfe0344ad6ac26e0c34fec0872b7bd117e7f8972ad654e2b01d
                      • Opcode Fuzzy Hash: 6bef0ccae2089935d190e8b9360ad9332fc181315f02a195d2bec06df2ccc5e7
                      • Instruction Fuzzy Hash: C7222574A04A05CFC724DF28C580AAABBF2FF89300F148599D85A9BB55EB35BD85CF41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: >_Ir
                      • API String ID: 0-3386957151
                      • Opcode ID: c004339ee5dd73da4c15d2a2ed9b7189f301e124a08be0a8c79c3bc7b05d5d1d
                      • Instruction ID: 07ca7f2b964b7ff280e3ed24ce1b348faad93bcba99e5f7b7a7f5ce863b4e832
                      • Opcode Fuzzy Hash: c004339ee5dd73da4c15d2a2ed9b7189f301e124a08be0a8c79c3bc7b05d5d1d
                      • Instruction Fuzzy Hash: 32E171B5A10205CFCB05CF58C9809A9FBF6FF85310729C596EA099F266D771ED82CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 0329019D
                      Memory Dump Source
                      • Source File: 00000019.00000002.422662470.0000000003290000.00000040.00000001.sdmp, Offset: 03290000, based on PE: false
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 47b8491fdd6e96d6ecca4a5420a6e69ce7c246f55f07b34a5d4c59f7eb8bc72b
                      • Instruction ID: 3ffd3ed2cc7c283780a44ba0216399dffd90402bf8c56b6812b3960ce9000072
                      • Opcode Fuzzy Hash: 47b8491fdd6e96d6ecca4a5420a6e69ce7c246f55f07b34a5d4c59f7eb8bc72b
                      • Instruction Fuzzy Hash: EC319FB1509784AFE712CB25DC84F56FFE8EF06610F08849BE984CB292D375A909CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 0329019D
                      Memory Dump Source
                      • Source File: 00000019.00000002.422662470.0000000003290000.00000040.00000001.sdmp, Offset: 03290000, based on PE: false
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 93a021017db89f37cb096c6146ade75d7bc93c167646a2ef93be2d66c4f4bbae
                      • Instruction ID: eba69ca10221bdec9f630a29ec8d18336869377880e212330469cd73f86af3f6
                      • Opcode Fuzzy Hash: 93a021017db89f37cb096c6146ade75d7bc93c167646a2ef93be2d66c4f4bbae
                      • Instruction Fuzzy Hash: F4218E71504244AFFB20DF25DC85B6AFBE8EF05610F18C4AAED458B241D7B1E544CA75
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: $ghr
                      • API String ID: 0-1352911727
                      • Opcode ID: d2489f1575b4c548bbd5c2681b9aab28e3c6b369f56206429096b3284ce6a694
                      • Instruction ID: 056406d0c0b5b4f4b1c790a47f2e99dd145b8d5321696880706bc411ccfc2490
                      • Opcode Fuzzy Hash: d2489f1575b4c548bbd5c2681b9aab28e3c6b369f56206429096b3284ce6a694
                      • Instruction Fuzzy Hash: ED51F274A04218CFCB24DF68C994B9DBBB2BF4A300F1040EAD50AAB761DB75AD85CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: $ghr
                      • API String ID: 0-1352911727
                      • Opcode ID: 7b856861fedfe711269eb2116e999c092d1bfd132681f2377fc75688291874bc
                      • Instruction ID: 5b23456e531ff9b81044cf96d2055842098b7bfbc9b5b40ce9a20b476150fa21
                      • Opcode Fuzzy Hash: 7b856861fedfe711269eb2116e999c092d1bfd132681f2377fc75688291874bc
                      • Instruction Fuzzy Hash: 59410D74A14219DFCB64EF68D840B9DBBB1BF4A340F1040AAD40AAB750DB75AD85CF52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: r*+
                      • API String ID: 0-3221063712
                      • Opcode ID: f7a3b2497ea97e40b7fc0b621a23ae86eb9b9907c1af81cf8bfd53055869b79f
                      • Instruction ID: ff4a90a17a9a6016d5bb561c48199428e0e0f1590e3c0760382d528249100289
                      • Opcode Fuzzy Hash: f7a3b2497ea97e40b7fc0b621a23ae86eb9b9907c1af81cf8bfd53055869b79f
                      • Instruction Fuzzy Hash: 40415E70E28309CFCB44DFA9C5456BEBBB1FF45304F14846AD402A7264DB749A85CF52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d2490e99fe4df5fb7c7bce41c7aa6f2f3ea2a017d439678c449432c31191eee
                      • Instruction ID: d9dbab6eb48938b97231e7def6558866fdf16d6ebb8ffa1038f0bb8fac877b04
                      • Opcode Fuzzy Hash: 8d2490e99fe4df5fb7c7bce41c7aa6f2f3ea2a017d439678c449432c31191eee
                      • Instruction Fuzzy Hash: F141C631B241049FC719DF2CC4146AE7BE6AFC6310F15846AE907EF291CEB19C4687A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd972fba25c70430c7550790f406daa013b6f9791adc809cd3c5f7b336e29ad3
                      • Instruction ID: bb60847329ff114c25caa8b8daadc56e882f87cf14144b6a1ac75b5b9c39fd6d
                      • Opcode Fuzzy Hash: cd972fba25c70430c7550790f406daa013b6f9791adc809cd3c5f7b336e29ad3
                      • Instruction Fuzzy Hash: 1F417E30614201CFC324AB39E95C56D3BABFF85716B14566AF903C72A8DF756C418F91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 186c1422b49ab1dd51e076de515b675f7bdc0cc526ef75c2cd8de17e17cbbe0f
                      • Instruction ID: c1191dd115acae41c679879860b0caaa89fa7602d24b3eaa89947696a63f786d
                      • Opcode Fuzzy Hash: 186c1422b49ab1dd51e076de515b675f7bdc0cc526ef75c2cd8de17e17cbbe0f
                      • Instruction Fuzzy Hash: 4C4138307102058FC724AB39E95C56E3BABFB85706B149669F903C62A8DF716C418FE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0fe61ea1f2bb54a354910869aa8e550aa69d8aae4ace284a941c76ecea21954b
                      • Instruction ID: 061101ab8c5bc969274aeb6e0afe260738966cd81cba1d8041a706674e3146db
                      • Opcode Fuzzy Hash: 0fe61ea1f2bb54a354910869aa8e550aa69d8aae4ace284a941c76ecea21954b
                      • Instruction Fuzzy Hash: 254170B0A11205CFDB18CB68C054BAEBBB2FF8A710F14846DD503AB3A1DB719C81CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3db24e0711e72f05d71b23fe89c0fff21e25e795f2f5a108d8ad7ae13628d834
                      • Instruction ID: f59a401fcb27ee973235b90f0645166592f5b0812c150ac0aa3b7e638833b7f7
                      • Opcode Fuzzy Hash: 3db24e0711e72f05d71b23fe89c0fff21e25e795f2f5a108d8ad7ae13628d834
                      • Instruction Fuzzy Hash: 9031A870A28315DFCB04DF54D98057E7BF5FF86700B118866C5459B245E774EC81C791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: daefedc56c2edbdb407ac4107ce63d11c16b4afa0b1372f5da1af4b351a01806
                      • Instruction ID: 5adbbdc6781071fab89125ab5e3c47cc5a89a4d0e20bbf4184628239771d5241
                      • Opcode Fuzzy Hash: daefedc56c2edbdb407ac4107ce63d11c16b4afa0b1372f5da1af4b351a01806
                      • Instruction Fuzzy Hash: 322125B0628356CFC714C728D884A79BBA9BF47314B1A4DA7E546CB251C7B29C80C792
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422563746.0000000003120000.00000040.00000040.sdmp, Offset: 03120000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 58c58e37799ee79764de9c6615b73c9eb57935f1d1cda2f52e390285efdcceec
                      • Instruction ID: f6c3006741e86b1df6e8aad9c7641e6c332acb86695a5e1cb07f8bf70ad2a0d6
                      • Opcode Fuzzy Hash: 58c58e37799ee79764de9c6615b73c9eb57935f1d1cda2f52e390285efdcceec
                      • Instruction Fuzzy Hash: 0C21857150D3809FC302CB14D840955BFF5EF8A614F29C6EFEC888B252D3369916CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7825521388909b5b82b4cfc692c1115b150dea1e827ccd921cbb361678b91e5
                      • Instruction ID: b35485edc05b0d60fe1b6e9a0752926b74d9577998f1deea5798afaca7ae19ee
                      • Opcode Fuzzy Hash: d7825521388909b5b82b4cfc692c1115b150dea1e827ccd921cbb361678b91e5
                      • Instruction Fuzzy Hash: A1314FB0D2C30EDFCB84DFA8C9446BEBBB1FB46304F10459AD40297255EA759E81CB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b791f1f62e042e98a29d9d008d5f25d284102c1503a20e8149123b98d2e04270
                      • Instruction ID: d4654aea80d8c6721cdea8ce76962edea28c3889dd9bb2801f29f433ff8e9f21
                      • Opcode Fuzzy Hash: b791f1f62e042e98a29d9d008d5f25d284102c1503a20e8149123b98d2e04270
                      • Instruction Fuzzy Hash: FA318D70A1034ACFDB60CF66C44069AFBF6FF85318F14DA69C0059B258DBB4A489CF81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4c39796a68102419a44c9f32765b24984d5e18d020c0c7f279ec7c698e210635
                      • Instruction ID: b81b49a458735c44407af411765abf995e68e43d4335ab51f44964a4d9080cc2
                      • Opcode Fuzzy Hash: 4c39796a68102419a44c9f32765b24984d5e18d020c0c7f279ec7c698e210635
                      • Instruction Fuzzy Hash: A9110AB06242459FCB14EBBAD8044FF7FBAAFD2300B1141ABC903D6144DEB599808761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6d2dbd702124176d28e178a6b734a691a3d0b5b22a5f66af842fe60554fec57
                      • Instruction ID: 1387d97b03e71bc2c942db6641eeaf90141fe146711088c8e8763f797dfdfffc
                      • Opcode Fuzzy Hash: a6d2dbd702124176d28e178a6b734a691a3d0b5b22a5f66af842fe60554fec57
                      • Instruction Fuzzy Hash: 8A110AB1B242058BDB24F7BAD4045BF7ABAAFD6340F51017BC50797284EEB0988087A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bbbfcbddab09d0a43ff4fec0a6dfeaaa43023ddb586dde738e8ddd05eb08c731
                      • Instruction ID: 59bd11a921f4dcb835af23c3bc9df5d6f3f6e841ab25aa8323f5f19477a6d08f
                      • Opcode Fuzzy Hash: bbbfcbddab09d0a43ff4fec0a6dfeaaa43023ddb586dde738e8ddd05eb08c731
                      • Instruction Fuzzy Hash: A011DBB0F78156EFCB20D5758C1077F61975B4698CF10C5AA8907E7540DAB0DD80C3B1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422563746.0000000003120000.00000040.00000040.sdmp, Offset: 03120000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4c3165e6adfc86b95f8d53bd4fe03dc63b03287ca801b1c560cab1eedf28f61d
                      • Instruction ID: 8716a9acbbf1bb1ce399dc8702dd80f17d280e341275a4f50f5a3ecc7f59c2d5
                      • Opcode Fuzzy Hash: 4c3165e6adfc86b95f8d53bd4fe03dc63b03287ca801b1c560cab1eedf28f61d
                      • Instruction Fuzzy Hash: DB11E434604384DFD705CB14C544B26BF95AB8C708F28CA9DE94A0B643C777D823CA91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422563746.0000000003120000.00000040.00000040.sdmp, Offset: 03120000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4cfbb38d58884d0ea64a5da9d9355dd31aa53ae5dd7fa355b2412f93dcbb8eec
                      • Instruction ID: 22959de376a1d61db7fa0b91927a473d7846340ccf08525ab3a26b52b08f87ba
                      • Opcode Fuzzy Hash: 4cfbb38d58884d0ea64a5da9d9355dd31aa53ae5dd7fa355b2412f93dcbb8eec
                      • Instruction Fuzzy Hash: 3E214D3520D3C49FD703CB24D850B15BFB1AF4B604F1986DED8899B6A3C33A981ADB52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a913b9679f2bf28d8587589fea894358c26038a6e0a28e714d3c0faf5e913cc
                      • Instruction ID: 6a6dfe1f4668eab932d926fcba5caa59c76eb79a027da9d405099c5cf3edc68d
                      • Opcode Fuzzy Hash: 5a913b9679f2bf28d8587589fea894358c26038a6e0a28e714d3c0faf5e913cc
                      • Instruction Fuzzy Hash: 8411827032C190DFC705EB28C4548A9BFF5BF8730171541FBE046CB6A2CEA69C5A8741
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bb8b028fbb7631680c60e0c05564efff8d323bff927fb59d58aa27be3c02312
                      • Instruction ID: eb33fc28194260e2d4d557cb64c0fe6ad75d4f1fd401fb3c3a9c8653eb7ad0da
                      • Opcode Fuzzy Hash: 4bb8b028fbb7631680c60e0c05564efff8d323bff927fb59d58aa27be3c02312
                      • Instruction Fuzzy Hash: 311148B0938359DFCB24CF59C940AAEBBB2FB46340F00486ED202A7640DBB11982CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 585aff4ed1a84d65e9bb732d83243f9006935514b93d2e04f414d958e8081b63
                      • Instruction ID: 5c9bad02511784db4a4b0bce03561059d511c5ccd75284a89f35ce843340237c
                      • Opcode Fuzzy Hash: 585aff4ed1a84d65e9bb732d83243f9006935514b93d2e04f414d958e8081b63
                      • Instruction Fuzzy Hash: CB113DB4718206DFCB14EB78D88549D7BE6FF80719B008A2CE69787704EFB5AC458B52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422563746.0000000003120000.00000040.00000040.sdmp, Offset: 03120000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 737bac07634f70becc84bcdb6227fb379b1730ca153c2e83c54c5c5a86ea49b9
                      • Instruction ID: e7c28736803152f27c2b5df3848b16b6f0caf5e9057ef28e3dd857171b5b8286
                      • Opcode Fuzzy Hash: 737bac07634f70becc84bcdb6227fb379b1730ca153c2e83c54c5c5a86ea49b9
                      • Instruction Fuzzy Hash: 2AF0A9765097806FD712CF16EC40862FFB8DF8662070DC4DFED498B652D265A909CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c679dcf1d51ba245426d10ea91f0d5339018777e07611cdae5fe979c4e3466f4
                      • Instruction ID: 697facb31c8c51bb4e3fcc89e556f17174c987633c16b572140c813862b09e9f
                      • Opcode Fuzzy Hash: c679dcf1d51ba245426d10ea91f0d5339018777e07611cdae5fe979c4e3466f4
                      • Instruction Fuzzy Hash: 4C016230328020CBC604E72CD05496977EABFCA71071441AAE506CB765CFF6AC598781
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1614b6b9e36569c6ccd90c97b6b74a472c90c852258c24e59020fd3bb3f34db0
                      • Instruction ID: b56253d891745ca84a8688dde7d9f071baa1b81920a5f52508e3d3b923437e07
                      • Opcode Fuzzy Hash: 1614b6b9e36569c6ccd90c97b6b74a472c90c852258c24e59020fd3bb3f34db0
                      • Instruction Fuzzy Hash: 1DF05C70A393448FD710DAB4881096BBFBA9B87B10B05849BD94397342C9B49C8783B2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 86b5ee54fee2117ee009cd0c9f81ca31e569e9d9641228c2dbfa4fbb659e5b13
                      • Instruction ID: 28bce283ffab4db2485a1363cd2120c3eee18841271ceb0f31c03d3ba4a577a5
                      • Opcode Fuzzy Hash: 86b5ee54fee2117ee009cd0c9f81ca31e569e9d9641228c2dbfa4fbb659e5b13
                      • Instruction Fuzzy Hash: 02E0E572F352189ADB10D9F8A8005AFBBA997C6A60F0084679E07A3200D9B0988542B1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e2befb61348ba07e1597705c26ca3e1fd6a54c48f3f869587a6b8e52801aa67
                      • Instruction ID: 11841bfd320d112851a7c487b38d48e1d2a865f6c9920ce002a251a0196ce436
                      • Opcode Fuzzy Hash: 1e2befb61348ba07e1597705c26ca3e1fd6a54c48f3f869587a6b8e52801aa67
                      • Instruction Fuzzy Hash: F5F05475B28508DBCB00DE58D5801ECBBE2FB85311B300156D7159B244DF755E818745
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422563746.0000000003120000.00000040.00000040.sdmp, Offset: 03120000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 525cef522958239b2deb72ab7ac90410e2832b06fb356f1b7ca8807ee3c9392c
                      • Instruction ID: 4400bd8e46a789e6db642bfe12ff98a34f100efaabd031801b4fbcc09796dc71
                      • Opcode Fuzzy Hash: 525cef522958239b2deb72ab7ac90410e2832b06fb356f1b7ca8807ee3c9392c
                      • Instruction Fuzzy Hash: 68F01D35104644DFC705DF00D540B16FBA6EB8D718F24CAADE9490B752C337D823DA81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422563746.0000000003120000.00000040.00000040.sdmp, Offset: 03120000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c8a3aa54490e32a5eec653aa7a45e2d4330fdb8f38a1f342dff31526124b6527
                      • Instruction ID: 59bd7b7108f465fdd98b7a7ce4838fe1ae629cc003ba92dd453d87bb89248dc3
                      • Opcode Fuzzy Hash: c8a3aa54490e32a5eec653aa7a45e2d4330fdb8f38a1f342dff31526124b6527
                      • Instruction Fuzzy Hash: B2E09276600A008BD650CF0BEC41462F7D8EB88630B18C47FDD0D8B700E275B504CEA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 212fe5c4b862dc0c8c91327b1ff375e0696bebb6ddd8c6fbbb5b41119107ab41
                      • Instruction ID: fe856caabe816c100e86ac6f3d5c1f0739f2259b1080e153b8d0891e444d4251
                      • Opcode Fuzzy Hash: 212fe5c4b862dc0c8c91327b1ff375e0696bebb6ddd8c6fbbb5b41119107ab41
                      • Instruction Fuzzy Hash: 4CD05EB01BC34CDFE35A4664D8167B03B65DB1B721F050DA2D2C78D0A6D599A8938B52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: feae5990b4c7fee11c324ada86a958f45531f33ca225cb53d9c22b8cb892ec83
                      • Instruction ID: a2e62cf80f0e7d6882659d9909159e7ac7b2b81d6e8a7b4f8e7305067b3ab53c
                      • Opcode Fuzzy Hash: feae5990b4c7fee11c324ada86a958f45531f33ca225cb53d9c22b8cb892ec83
                      • Instruction Fuzzy Hash: 30E0C270249300CFC71A5BB0A81B0A83BA5EB0632471004BDC84687762EA7E9852CB45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46edc7d5591b5e21b82aa3e408cd94cb55d8e32f04028b3901b43a6765db4201
                      • Instruction ID: 8e8ed8f0b5ea59ff5e53699d1b34466bd7db633ec82e5c2d3d1387b4a639a83a
                      • Opcode Fuzzy Hash: 46edc7d5591b5e21b82aa3e408cd94cb55d8e32f04028b3901b43a6765db4201
                      • Instruction Fuzzy Hash: C4E0C27156C700CFC351C758EC4A4917BF2BB86210304895FD487C7605C7A4BC828750
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e2d3abcf1d7ff8ecd1d8604bc92c590454401c9907069c1561577b276cf5499f
                      • Instruction ID: f4a13e4c0fc86f0cb1d1b936a16429db810c8b302475bae07e22d03cb8f119f8
                      • Opcode Fuzzy Hash: e2d3abcf1d7ff8ecd1d8604bc92c590454401c9907069c1561577b276cf5499f
                      • Instruction Fuzzy Hash: 52D0A7F24E97858FC3414AB018191F47B59DAA3251B8084B2C90145825E5B669A38FA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 580513e48ef4f4cdbd6232fa93bbe1151516cd9e10517cb8636a983924f89867
                      • Instruction ID: 87b64c7fbe4fc6068de693cbb3f97256a2394f5e0d82c2ea0c681aafb10cfaad
                      • Opcode Fuzzy Hash: 580513e48ef4f4cdbd6232fa93bbe1151516cd9e10517cb8636a983924f89867
                      • Instruction Fuzzy Hash: C8D01270200304CFCB282B70E4194283369AB45705710087CD81687744EF37E850CB04
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a18b9b92ce7bde496abaae609e42e84a8ee8aea23b98360c2563a797f61ffdb9
                      • Instruction ID: 2f82c8157d8a5d0631b88ca96a2fa336641f05a2c8be13c9c1f370fc45544faf
                      • Opcode Fuzzy Hash: a18b9b92ce7bde496abaae609e42e84a8ee8aea23b98360c2563a797f61ffdb9
                      • Instruction Fuzzy Hash: B8C092B42BCB0CEAE5A89184ED1AF74721C970EB16F500C02A30F1C4A89DD1F1904756
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87f65e239dcaf0ecea1136cdb7302cf915d9d1667ff2632d1d26d64bd8337829
                      • Instruction ID: 67e57b2b5b6320db742dfe52ad6112d963abdd6cd257c380bd04dc8a0eff819e
                      • Opcode Fuzzy Hash: 87f65e239dcaf0ecea1136cdb7302cf915d9d1667ff2632d1d26d64bd8337829
                      • Instruction Fuzzy Hash: 7DC09BB10F5658CFC2559AB16805539721D96D3705750C435D903101298DB2B4F19E75
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f2253714bb2000ae75e8c434a552c0a27461b2e9276a7d62e46f4c6c0dfc5d8
                      • Instruction ID: 13c93a21751397a7c021fdd127873131d3b7469f88693face100eb2afa5abef9
                      • Opcode Fuzzy Hash: 2f2253714bb2000ae75e8c434a552c0a27461b2e9276a7d62e46f4c6c0dfc5d8
                      • Instruction Fuzzy Hash: 57B012312143094F975096B1680AB12338C8580A0974504E5D80CC0000F504F0D02384
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 488e0fc806a0095505b93d31004e9ed1f17e2ba8042b5561b77f6d5986401649
                      • Instruction ID: ef613073f32aab2cce958004a89547656544902b771d90ddf745b34aca802394
                      • Opcode Fuzzy Hash: 488e0fc806a0095505b93d31004e9ed1f17e2ba8042b5561b77f6d5986401649
                      • Instruction Fuzzy Hash: 5151AD76F004159BD728DB6DC980A9EBBF3AFC8310F2A8164D409DB3A9DE30DD418B80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000019.00000002.422611677.0000000003230000.00000040.00000001.sdmp, Offset: 03230000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: ,:kr$0jr$:@Dr$X1kr
                      • API String ID: 0-1245831938
                      • Opcode ID: 3d68ae40a934c11e9a2bc0096dca2351f3a5150f070f5819685eea1b0e83321c
                      • Instruction ID: affdb44ebc1dca651cfd05e743addeb6446840c84fa146d1ab1826f8ec63fb65
                      • Opcode Fuzzy Hash: 3d68ae40a934c11e9a2bc0096dca2351f3a5150f070f5819685eea1b0e83321c
                      • Instruction Fuzzy Hash: 5EB1BA70A08344DFD3A4DF789260B6ABBE2FB99704F50592EE5458B394EF769C41CB02
                      Uniqueness

                      Uniqueness Score: -1.00%