Loading ...

Play interactive tourEdit tour

Analysis Report 9n7miZydYC.exe

Overview

General Information

Sample Name:9n7miZydYC.exe
Analysis ID:431749
MD5:61de33a77d34a313df07dc2bdd28140a
SHA1:2690f84adb2c6174aab432a61737ca892af2d206
SHA256:9037afbf6a54684a77a6d0b204daa0a843555e01a9bd600545d8ae252b88fad7
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 9n7miZydYC.exe (PID: 780 cmdline: 'C:\Users\user\Desktop\9n7miZydYC.exe' MD5: 61DE33A77D34A313DF07DC2BDD28140A)
    • 9n7miZydYC.exe (PID: 1736 cmdline: {path} MD5: 61DE33A77D34A313DF07DC2BDD28140A)
      • schtasks.exe (PID: 4560 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4356 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC67B.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 9n7miZydYC.exe (PID: 4716 cmdline: C:\Users\user\Desktop\9n7miZydYC.exe 0 MD5: 61DE33A77D34A313DF07DC2BDD28140A)
    • 9n7miZydYC.exe (PID: 3040 cmdline: {path} MD5: 61DE33A77D34A313DF07DC2BDD28140A)
    • 9n7miZydYC.exe (PID: 4280 cmdline: {path} MD5: 61DE33A77D34A313DF07DC2BDD28140A)
    • 9n7miZydYC.exe (PID: 5752 cmdline: {path} MD5: 61DE33A77D34A313DF07DC2BDD28140A)
  • dhcpmon.exe (PID: 5508 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 61DE33A77D34A313DF07DC2BDD28140A)
    • dhcpmon.exe (PID: 2148 cmdline: {path} MD5: 61DE33A77D34A313DF07DC2BDD28140A)
  • dhcpmon.exe (PID: 5668 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 61DE33A77D34A313DF07DC2BDD28140A)
    • dhcpmon.exe (PID: 3504 cmdline: {path} MD5: 61DE33A77D34A313DF07DC2BDD28140A)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f9198f9a-66a7-4bba-ab1c-dff8091c", "Group": "Default", "Domain1": "tzitziklishop.ddns.net", "Domain2": "tzitziklishop.ddns.net", "Port": 1665, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x435a5:$a: NanoCore
      • 0x435fe:$a: NanoCore
      • 0x4363b:$a: NanoCore
      • 0x436b4:$a: NanoCore
      • 0x56d5f:$a: NanoCore
      • 0x56d74:$a: NanoCore
      • 0x56da9:$a: NanoCore
      • 0x6fd63:$a: NanoCore
      • 0x6fd78:$a: NanoCore
      • 0x6fdad:$a: NanoCore
      • 0x43607:$b: ClientPlugin
      • 0x43644:$b: ClientPlugin
      • 0x43f42:$b: ClientPlugin
      • 0x43f4f:$b: ClientPlugin
      • 0x56b1b:$b: ClientPlugin
      • 0x56b36:$b: ClientPlugin
      • 0x56b66:$b: ClientPlugin
      • 0x56d7d:$b: ClientPlugin
      • 0x56db2:$b: ClientPlugin
      • 0x6fb1f:$b: ClientPlugin
      • 0x6fb3a:$b: ClientPlugin
      Click to see the 99 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      31.0.dhcpmon.exe.400000.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      31.0.dhcpmon.exe.400000.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      31.0.dhcpmon.exe.400000.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        31.0.dhcpmon.exe.400000.3.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        31.2.dhcpmon.exe.3c505fc.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0x287b1:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        • 0x287de:$x2: IClientNetworkHost
        Click to see the 116 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\9n7miZydYC.exe, ProcessId: 1736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\9n7miZydYC.exe, ProcessId: 1736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\9n7miZydYC.exe, ProcessId: 1736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\9n7miZydYC.exe, ProcessId: 1736, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f9198f9a-66a7-4bba-ab1c-dff8091c", "Group": "Default", "Domain1": "tzitziklishop.ddns.net", "Domain2": "tzitziklishop.ddns.net", "Port": 1665, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "", "BackupDNSServer": "37.235.1.177", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: tzitziklishop.ddns.netVirustotal: Detection: 8%Perma Link
        Source: tzitziklishop.ddns.netVirustotal: Detection: 8%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 36%
        Multi AV Scanner detection for submitted fileShow sources
        Source: 9n7miZydYC.exeVirustotal: Detection: 47%Perma Link
        Source: 9n7miZydYC.exeReversingLabs: Detection: 36%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORY
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: 9n7miZydYC.exeJoe Sandbox ML: detected
        Source: 31.0.dhcpmon.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 31.0.dhcpmon.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.9n7miZydYC.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.0.dhcpmon.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 29.0.9n7miZydYC.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.9n7miZydYC.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.0.9n7miZydYC.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.0.dhcpmon.exe.400000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 29.2.9n7miZydYC.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 29.0.9n7miZydYC.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 31.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 9n7miZydYC.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 9n7miZydYC.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorlib.pdb source: 9n7miZydYC.exe, 00000007.00000003.345052712.00000000011CD000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\geNROzYNTy\src\obj\Debug\grlL.pdb source: 9n7miZydYC.exe

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49732 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49733 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49735 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49739 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49750 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49751 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49752 -> 103.133.106.117:1665
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49753 -> 103.133.106.117:1665
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: tzitziklishop.ddns.net
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: tzitziklishop.ddns.net
        Source: global trafficTCP traffic: 192.168.2.3:49732 -> 103.133.106.117:1665
        Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownUDP traffic detected without corresponding DNS query: 37.235.1.174
        Source: unknownDNS traffic detected: queries for: tzitziklishop.ddns.net
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 9n7miZydYC.exe, 00000000.00000003.202338594.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: 9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTFJ
        Source: dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: 9n7miZydYC.exe, 00000000.00000003.202721265.000000000624D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: 9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comA
        Source: 9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF-
        Source: 9n7miZydYC.exe, 00000000.00000003.278151367.0000000006210000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: 9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
        Source: 9n7miZydYC.exe, 00000000.00000003.202769761.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsoS
        Source: 9n7miZydYC.exe, 00000000.00000003.202769761.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcom
        Source: 9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
        Source: 9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comde
        Source: 9n7miZydYC.exe, 00000000.00000003.278151367.0000000006210000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comgrita6
        Source: 9n7miZydYC.exe, 00000000.00000003.202769761.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlicd
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: 9n7miZydYC.exe, 00000000.00000003.200242240.0000000006214000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/T
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: 9n7miZydYC.exe, 00000000.00000003.203426791.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: 9n7miZydYC.exe, 00000000.00000003.203426791.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/S
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/$
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/6
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/?
        Source: 9n7miZydYC.exe, 00000000.00000003.201209002.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/S
        Source: 9n7miZydYC.exe, 00000000.00000003.201209002.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/da-dw
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/e
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/$
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/A
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/S
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/e
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/k
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oiJ
        Source: 9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ue
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/va
        Source: 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/w
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: 9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: dhcpmon.exe, 00000013.00000002.372093310.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: 9n7miZydYC.exe, 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORY
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.9n7miZydYC.exe.30a9530.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.dhcpmon.exe.3329658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.2.dhcpmon.exe.2c69658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large stringsShow sources
        Source: 9n7miZydYC.exe, Form1.csLong String: Length: 11840
        Source: 0.2.9n7miZydYC.exe.ef0000.0.unpack, Form1.csLong String: Length: 11840
        Source: 0.0.9n7miZydYC.exe.ef0000.0.unpack, Form1.csLong String: Length: 11840
        Source: dhcpmon.exe.7.dr, Form1.csLong String: Length: 11840
        Source: 7.0.9n7miZydYC.exe.a20000.2.unpack, Form1.csLong String: Length: 11840
        Source: 7.2.9n7miZydYC.exe.a20000.1.unpack, Form1.csLong String: Length: 11840
        Source: 7.0.9n7miZydYC.exe.a20000.0.unpack, Form1.csLong String: Length: 11840
        Source: 7.0.9n7miZydYC.exe.a20000.4.unpack, Form1.csLong String: Length: 11840
        Source: 15.0.9n7miZydYC.exe.570000.0.unpack, Form1.csLong String: Length: 11840
        Source: 15.2.9n7miZydYC.exe.570000.0.unpack, Form1.csLong String: Length: 11840
        Source: 19.2.dhcpmon.exe.6d0000.0.unpack, Form1.csLong String: Length: 11840
        Source: 19.0.dhcpmon.exe.6d0000.0.unpack, Form1.csLong String: Length: 11840
        Source: 21.0.dhcpmon.exe.c0000.0.unpack, Form1.csLong String: Length: 11840
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_07CE10E8
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_07CE1099
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_07CE0040
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_07CE0013
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_0195C144
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_0195E590
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_0195E580
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 15_2_0297C144
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 15_2_0297E590
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 15_2_0297E580
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02A4C144
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02A4E580
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02A4E590
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F35418
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F32030
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F326D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F326CA
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F35408
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F310E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F31099
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F33080
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F30040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F33045
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F32020
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F33020
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F30006
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F39958
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E4858
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EBA20
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E1A98
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084ED2B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E2BD8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EC400
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EADF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E9D90
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E5720
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E8F98
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E90B1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EE148
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EE158
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EA25A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EA268
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EBA12
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E1A88
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084ED296
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EF340
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EF330
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E2BD5
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EC3F1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EECC0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EECD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EAD5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084E9D11
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EF520
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EF530
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EBE72
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EBE80
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EF7C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EEFC1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EEFD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_084EF7B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_00ACC144
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_00ACE580
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_00ACE590
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_049E51E0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_049E67E3
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_049E51D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E5418
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E2030
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E26CD
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E26D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E5412
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E3080
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E10E8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E10E2
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E0006
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E2020
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E3020
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E3045
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E0040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E9958
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF5720
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFADF8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF9D90
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFC400
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF2BD8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF1AE8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFD2B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFBA20
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF90C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF4858
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFEFD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFEFC1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFF7C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFF7B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFBE80
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFBE71
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFADD5
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFF530
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFF520
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFECD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFECC0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF2BC8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFC3F1
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFF340
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFF330
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DF1AD8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFD297
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFA258
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFA268
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFBA11
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFE158
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_07DFE148
        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 9037AFBF6A54684A77A6D0B204DAA0A843555E01A9BD600545D8AE252B88FAD7
        Source: 9n7miZydYC.exeBinary or memory string: OriginalFilename vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 00000000.00000002.279901612.000000000371D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 00000000.00000002.278383354.0000000000EF2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 00000000.00000002.279167689.0000000003334000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exeBinary or memory string: OriginalFilename vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 00000007.00000000.276911901.0000000000A22000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 00000007.00000003.345563216.0000000001261000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exeBinary or memory string: OriginalFilename vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000000F.00000002.372101985.0000000002B81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000000F.00000000.286394181.0000000000572000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000000F.00000002.384331171.0000000007040000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000001B.00000002.365016795.0000000000352000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000001C.00000000.365724712.00000000003B2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000001D.00000000.367918632.0000000000C72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exe, 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exeBinary or memory string: OriginalFilenamegrlL.exeR vs 9n7miZydYC.exe
        Source: 9n7miZydYC.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.9n7miZydYC.exe.30a9530.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.9n7miZydYC.exe.30a9530.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.dhcpmon.exe.3329658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.dhcpmon.exe.3329658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.2.dhcpmon.exe.2c69658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.2.dhcpmon.exe.2c69658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 9n7miZydYC.exe, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.9n7miZydYC.exe.ef0000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.9n7miZydYC.exe.ef0000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: dhcpmon.exe.7.dr, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@22/12@12/1
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9n7miZydYC.exe.logJump to behavior
        Source: C:\Users\user\Desktop\9n7miZydYC.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f9198f9a-66a7-4bba-ab1c-dff8091cd717}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4548:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3660:120:WilError_01
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC2C1.tmpJump to behavior
        Source: 9n7miZydYC.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\9n7miZydYC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\9n7miZydYC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\9n7miZydYC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\9n7miZydYC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\9n7miZydYC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: 9n7miZydYC.exeVirustotal: Detection: 47%
        Source: 9n7miZydYC.exeReversingLabs: Detection: 36%
        Source: 9n7miZydYC.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
        Source: 9n7miZydYC.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
        Source: 9n7miZydYC.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
        Source: 9n7miZydYC.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile read: C:\Users\user\Desktop\9n7miZydYC.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\9n7miZydYC.exe 'C:\Users\user\Desktop\9n7miZydYC.exe'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC67B.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\9n7miZydYC.exe C:\Users\user\Desktop\9n7miZydYC.exe 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC67B.tmp'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: 9n7miZydYC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: 9n7miZydYC.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: 9n7miZydYC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: mscorlib.pdb source: 9n7miZydYC.exe, 00000007.00000003.345052712.00000000011CD000.00000004.00000001.sdmp
        Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\geNROzYNTy\src\obj\Debug\grlL.pdb source: 9n7miZydYC.exe

        Data Obfuscation:

        barindex
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: 9n7miZydYC.exe, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.2.9n7miZydYC.exe.ef0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.0.9n7miZydYC.exe.ef0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: dhcpmon.exe.7.dr, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 7.0.9n7miZydYC.exe.a20000.2.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 7.2.9n7miZydYC.exe.a20000.1.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 7.0.9n7miZydYC.exe.a20000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 7.0.9n7miZydYC.exe.a20000.4.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 15.0.9n7miZydYC.exe.570000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 15.2.9n7miZydYC.exe.570000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 19.2.dhcpmon.exe.6d0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 19.0.dhcpmon.exe.6d0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 21.0.dhcpmon.exe.c0000.0.unpack, Form1.cs.Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
        .NET source code contains potential unpackerShow sources
        Source: 9n7miZydYC.exe, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.9n7miZydYC.exe.ef0000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.9n7miZydYC.exe.ef0000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: dhcpmon.exe.7.dr, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.a20000.2.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.9n7miZydYC.exe.a20000.1.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.a20000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.0.9n7miZydYC.exe.a20000.4.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 15.0.9n7miZydYC.exe.570000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 15.2.9n7miZydYC.exe.570000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.dhcpmon.exe.6d0000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.0.dhcpmon.exe.6d0000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 21.0.dhcpmon.exe.c0000.0.unpack, Form1.cs.Net Code: I_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_07CA1CF1 push es; ret
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 0_2_0195F950 pushad ; iretd
        Source: C:\Users\user\Desktop\9n7miZydYC.exeCode function: 15_2_0297F950 pushad ; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_02A4F950 pushad ; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F32539 push cs; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F30AF0 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F36891 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F3685D push es; retf
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F33037 push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 19_2_06F33020 push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_00ACF950 pushad ; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E6891 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E3020 push es; ret
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_068E3037 push es; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.60711640242
        Source: initial sampleStatic PE information: section name: .text entropy: 7.60711640242
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.9n7miZydYC.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.9n7miZydYC.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.0.9n7miZydYC.exe.400000.3.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\9n7miZydYC.exeFile opened: C:\Users\user\Desktop\9n7miZydYC.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000013.00000002.372998253.0000000002AD6000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.279167689.0000000003334000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.372309695.0000000002BD6000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: 9n7miZydYC.exe, 00000000.00000002.279167689.0000000003334000.00000004.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.372309695.0000000002BD6000.00000004.00000001.sdmp, dhcpmon.exe, 00000013.00000002.372998253.0000000002AD6000.00000004.00000001.sdmp, dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: 9n7miZydYC.exe, 00000000.00000002.279167689.0000000003334000.00000004.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.372309695.0000000002BD6000.00000004.00000001.sdmp, dhcpmon.exe, 00000013.00000002.372998253.0000000002AD6000.00000004.00000001.sdmp, dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWindow / User API: threadDelayed 4922
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWindow / User API: threadDelayed 4405
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWindow / User API: foregroundWindowGot 358
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWindow / User API: foregroundWindowGot 397
        Source: C:\Users\user\Desktop\9n7miZydYC.exe TID: 5556Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\9n7miZydYC.exe TID: 1092Thread sleep time: -11990383647911201s >= -30000s
        Source: C:\Users\user\Desktop\9n7miZydYC.exe TID: 2440Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1332Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 676Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\9n7miZydYC.exe TID: 5352Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5512Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5220Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\9n7miZydYC.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: 9n7miZydYC.exe, 00000007.00000003.345204132.0000000001234000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\9n7miZydYC.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\9n7miZydYC.exeMemory written: C:\Users\user\Desktop\9n7miZydYC.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC67B.tmp'
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeProcess created: C:\Users\user\Desktop\9n7miZydYC.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Users\user\Desktop\9n7miZydYC.exe VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Users\user\Desktop\9n7miZydYC.exe VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Users\user\Desktop\9n7miZydYC.exe VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Users\user\Desktop\9n7miZydYC.exe VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\9n7miZydYC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\9n7miZydYC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORY
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: 9n7miZydYC.exe, 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 9n7miZydYC.exe, 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 9n7miZydYC.exe, 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 9n7miZydYC.exe, 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: 9n7miZydYC.exe, 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2148, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 5752, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 4716, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3504, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5508, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 780, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 9n7miZydYC.exe PID: 1736, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5668, type: MEMORY
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.408b7c6.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.9n7miZydYC.exe.43b51e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.0.9n7miZydYC.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.0.dhcpmon.exe.400000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.430b7c6.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c505fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.4094c25.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.2.9n7miZydYC.exe.40905fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.dhcpmon.exe.3b551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.dhcpmon.exe.35151e0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 29.0.9n7miZydYC.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.43105fc.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c54c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.9n7miZydYC.exe.3c551e0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 30.2.dhcpmon.exe.4314c25.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 31.2.dhcpmon.exe.3c4b7c6.3.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection111Masquerading2Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing22Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 431749 Sample: 9n7miZydYC.exe Startdate: 09/06/2021 Architecture: WINDOWS Score: 100 52 tzitziklishop.ddns.net 2->52 56 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->56 58 Multi AV Scanner detection for domain / URL 2->58 60 Found malware configuration 2->60 62 15 other signatures 2->62 9 9n7miZydYC.exe 3 2->9         started        13 dhcpmon.exe 3 2->13         started        15 dhcpmon.exe 2 2->15         started        17 9n7miZydYC.exe 2 2->17         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\9n7miZydYC.exe.log, ASCII 9->50 dropped 66 Uses schtasks.exe or at.exe to add and modify task schedules 9->66 68 Injects a PE file into a foreign processes 9->68 19 9n7miZydYC.exe 1 16 9->19         started        24 dhcpmon.exe 13->24         started        26 dhcpmon.exe 15->26         started        28 9n7miZydYC.exe 17->28         started        30 9n7miZydYC.exe 17->30         started        32 9n7miZydYC.exe 17->32         started        signatures6 process7 dnsIp8 54 tzitziklishop.ddns.net 103.133.106.117, 1665, 49732, 49733 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 19->54 42 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->42 dropped 44 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->44 dropped 46 C:\Users\user\AppData\Local\...\tmpC2C1.tmp, XML 19->46 dropped 48 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->48 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->64 34 schtasks.exe 1 19->34         started        36 schtasks.exe 1 19->36         started        file9 signatures10 process11 process12 38 conhost.exe 34->38         started        40 conhost.exe 36->40         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        9n7miZydYC.exe48%VirustotalBrowse
        9n7miZydYC.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        9n7miZydYC.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        31.0.dhcpmon.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        31.0.dhcpmon.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.9n7miZydYC.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.0.dhcpmon.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        29.0.9n7miZydYC.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.9n7miZydYC.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.0.9n7miZydYC.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.0.dhcpmon.exe.400000.3.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        29.2.9n7miZydYC.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        29.0.9n7miZydYC.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        31.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        SourceDetectionScannerLabelLink
        tzitziklishop.ddns.net9%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        tzitziklishop.ddns.net9%VirustotalBrowse
        tzitziklishop.ddns.net0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/A0%Avira URL Cloudsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/ue0%Avira URL Cloudsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/60%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/60%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/60%URL Reputationsafe
        http://www.fontbureau.comlicd0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/e0%Avira URL Cloudsafe
        http://www.fontbureau.comcom0%URL Reputationsafe
        http://www.fontbureau.comcom0%URL Reputationsafe
        http://www.fontbureau.comcom0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/-0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/-0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/-0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/S0%Avira URL Cloudsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/$0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/$0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/$0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.fontbureau.comA0%Avira URL Cloudsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comF-0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.galapagosdesign.com/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/oiJ0%Avira URL Cloudsafe
        http://www.galapagosdesign.com/S0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/S0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/S0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/S0%URL Reputationsafe
        http://www.fontbureau.comde0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
        http://www.founder.com.cn/cn/T0%Avira URL Cloudsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.fontbureau.comd0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/?0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/?0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/?0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.fontbureau.com.TTFJ0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/w0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/w0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/w0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/va0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/jp/$0%Avira URL Cloudsafe
        http://www.fontbureau.comalsoS0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/k0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        tzitziklishop.ddns.net
        103.133.106.117
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        tzitziklishop.ddns.nettrue
        • 9%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.fontbureau.com/designersG9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
          high
          http://www.jiyu-kobo.co.jp/jp/A9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers/?9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bThe9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/ue9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
              high
              http://www.tiro.comdhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designersdhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                high
                http://www.goodfont.co.kr9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.com9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.typography.netD9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/cThe9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htm9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://fontfabrik.com9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/89n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/69n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comlicd9n7miZydYC.exe, 00000000.00000003.202769761.0000000006216000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/e9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comcom9n7miZydYC.exe, 00000000.00000003.202769761.0000000006216000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/-9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/DPlease9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fonts.com9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                  high
                  http://www.sandoll.co.kr9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/jp/S9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.urwpp.deDPlease9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/$9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.zhongyicts.com.cn9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comA9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.sakkal.com9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comF-9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.apache.org/licenses/LICENSE-2.09n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com9n7miZydYC.exe, 00000000.00000003.202338594.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                      high
                      http://www.galapagosdesign.com/9n7miZydYC.exe, 00000000.00000003.203426791.0000000006216000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/oiJ9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/S9n7miZydYC.exe, 00000000.00000003.203426791.0000000006216000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/S9n7miZydYC.exe, 00000000.00000003.201209002.0000000006216000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comde9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.coma9n7miZydYC.exe, 00000000.00000003.278151367.0000000006210000.00000004.00000001.sdmpfalse
                        unknown
                        http://www.founder.com.cn/cn/T9n7miZydYC.exe, 00000000.00000003.200242240.0000000006214000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comd9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/?9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.coml9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com.TTFJ9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlN9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/w9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.html9n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/va9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/$9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.html9n7miZydYC.exe, 00000000.00000003.202721265.000000000624D000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comalsoS9n7miZydYC.exe, 00000000.00000003.202769761.0000000006216000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 00000000.00000003.201498360.0000000006216000.00000004.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/k9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comgrita69n7miZydYC.exe, 00000000.00000003.278151367.0000000006210000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers89n7miZydYC.exe, 00000000.00000002.283745706.0000000006300000.00000002.00000001.sdmp, 9n7miZydYC.exe, 0000000F.00000002.382823509.0000000005A40000.00000002.00000001.sdmp, dhcpmon.exe, 00000013.00000002.383614397.0000000005A80000.00000002.00000001.sdmp, dhcpmon.exe, 00000015.00000002.395701262.0000000005420000.00000002.00000001.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/e9n7miZydYC.exe, 00000000.00000003.201375392.0000000006216000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comalic9n7miZydYC.exe, 00000000.00000003.202928477.0000000006216000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/da-dw9n7miZydYC.exe, 00000000.00000003.201209002.0000000006216000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                103.133.106.117
                                tzitziklishop.ddns.netViet Nam
                                135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue

                                General Information

                                Joe Sandbox Version:32.0.0 Black Diamond
                                Analysis ID:431749
                                Start date:09.06.2021
                                Start time:08:39:19
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 13m 18s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:9n7miZydYC.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:36
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@22/12@12/1
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 0% (good quality ratio 0%)
                                • Quality average: 75%
                                • Quality standard deviation: 0%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • TCP Packets have been reduced to 100
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                • Not all processes where analyzed, report is missing behavior information
                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                08:40:45Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\9n7miZydYC.exe" s>$(Arg0)
                                08:40:45API Interceptor694x Sleep call for process: 9n7miZydYC.exe modified
                                08:40:45AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                08:40:47Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                103.133.106.117NEW ORDER Ref PO-298721.docGet hashmaliciousBrowse
                                  NEW ORDER (Ref PO-298721).exeGet hashmaliciousBrowse

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    tzitziklishop.ddns.netNEW ORDER Ref PO-298721.docGet hashmaliciousBrowse
                                    • 103.133.106.117
                                    NEW ORDER (Ref PO-298721).exeGet hashmaliciousBrowse
                                    • 103.133.106.117
                                    plf.exeGet hashmaliciousBrowse
                                    • 103.89.90.73
                                    365d37e0_by_Libranalysis.exeGet hashmaliciousBrowse
                                    • 103.89.90.73
                                    SWIFT COPY.xlsxGet hashmaliciousBrowse
                                    • 103.89.90.73

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNNEW ORDER Ref PO-298721.docGet hashmaliciousBrowse
                                    • 103.133.106.117
                                    2-2.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    3-1.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    2-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    3-2.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    3-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    7-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    7-2.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    9-1.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    9-2.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    9-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    11-1.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    11-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    13-1.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    13-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    13-2.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    15-1.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    15-3.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    15-2.exeGet hashmaliciousBrowse
                                    • 103.114.107.28
                                    17-1.exeGet hashmaliciousBrowse
                                    • 103.114.107.28

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNEW ORDER Ref PO-298721.docGet hashmaliciousBrowse

                                      Created / dropped Files

                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):736256
                                      Entropy (8bit):7.59865760202799
                                      Encrypted:false
                                      SSDEEP:6144:x2j8F5ve0At+vWlrOXMRzyeYlDW6PzaIm8MI8x39qflzAQnT6kygum2OMidd8P99:sj8FU9qXKueqZPeLhI8N0MQn5zdd8ld
                                      MD5:61DE33A77D34A313DF07DC2BDD28140A
                                      SHA1:2690F84ADB2C6174AAB432A61737CA892AF2D206
                                      SHA-256:9037AFBF6A54684A77A6D0B204DAA0A843555E01A9BD600545D8AE252B88FAD7
                                      SHA-512:9AAD4399FB37F78D1E658006EFDFE218607F51D630496CE7FBC1766BDD78B8F360657C8A661CF48602105F5C7D7A9C772180D5307BC3B9D5E2D2DE2CDB24E4C1
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 37%
                                      Joe Sandbox View:
                                      • Filename: NEW ORDER Ref PO-298721.doc, Detection: malicious, Browse
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....j.`..............0..2...........Q... ...`....@.. ....................................@.................................pQ..O....`..............................8P............................................... ............... ..H............text....1... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............:..............@..B.................Q......H...................k....x................................................r...p}......}.....(.......(.....*..0..?.........{....o....r[..p(....-\.{....o....r[..p(....-E.{....o....r[..p(....-..{....o....r[..p(....-..{....o....r[..p(....+......,..r]..p(....&8.....{....s........=...%.ry..p.%..{....o.....%.r...p.%..{....o.....%.r...p.%..{....o.....%.r...p.%..{....o.....%.r...p.%...{....o.....%..r...p.(.......s......o......o.....r...p(....&**...(.....*..*....0..+.........,..{......
                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview: [ZoneTransfer]....ZoneId=0
                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9n7miZydYC.exe.log
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:true
                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:false
                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1300
                                      Entropy (8bit):5.118944582901851
                                      Encrypted:false
                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0j/xtn:cbk4oL600QydbQxIYODOLedq30j
                                      MD5:A9BA54AEEE57957F8C82B492D8C5097B
                                      SHA1:768E15E065FCA4DF27F898AA6E2DFCBB3EBAAC21
                                      SHA-256:6F19738FFCBFB6AC48E387D6E9DF6941EAD5DACF9D56A6510EDA963CF1A18814
                                      SHA-512:E8C5005D1ECD66BA35C122C34FF8EE043A6101EFC1E5144C7708C2A1E8E023F956BC8F38AB96FAC3675382CC255A5F5A91830F6DC4D56635AF70D4C8F92475C8
                                      Malicious:true
                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                      C:\Users\user\AppData\Local\Temp\tmpC67B.tmp
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1310
                                      Entropy (8bit):5.109425792877704
                                      Encrypted:false
                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                      MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                      SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                      SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                      SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                      Malicious:false
                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2320
                                      Entropy (8bit):7.089541637477408
                                      Encrypted:false
                                      SSDEEP:48:IknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhL:HjhDjhDjhDjhDjhDjhDjhDjhDjhDjhL
                                      MD5:2CC2E05CB39A76B255530F61BA4AA2E3
                                      SHA1:76BD6001B1922B2B3FB2F618740FA74A6C532A7F
                                      SHA-256:FBF89196FF1A9FC33EE6C42DC0A959DAA89E2322F3417C77534C9968C0885271
                                      SHA-512:2EACD3A81456781803A9C14F7471DBBDB126BBE7AEC3105B1A49AB115A8BB831EA0D1DF48BAB00EB8231B114EAE5A03DF73A7A60B45BA03CB2F92382CF4DBB38
                                      Malicious:false
                                      Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:ISO-8859 text
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):3.0
                                      Encrypted:false
                                      SSDEEP:3:GL8tn:GL8n
                                      MD5:BDFAE484F0490CA439A3B3B99266C3D7
                                      SHA1:DE3458EAE36DEB1F38BF5166C041F88423D2F8A8
                                      SHA-256:FDDDA7C9DE87079CC5EACD239E0C4320D8A9B594C01EF48E6E5B9BC319BEE5E1
                                      SHA-512:5E3AD9DBE4001CAA46506169E0B94167DB95480190B6FF39BB1BDDC3E05F76F54899A9C148C821DC01C51E0BE90ADE6BE1E0E641CFB07832977E3632E5AB5054
                                      Malicious:true
                                      Preview: ..0.\+.H
                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):24
                                      Entropy (8bit):4.501629167387823
                                      Encrypted:false
                                      SSDEEP:3:9bzY6oRDIvYk:RzWDI3
                                      MD5:ACD3FB4310417DC77FE06F15B0E353E6
                                      SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
                                      SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
                                      SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
                                      Malicious:false
                                      Preview: 9iH...}Z.4..f..J".C;"a
                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):5.320159765557392
                                      Encrypted:false
                                      SSDEEP:3:9bzY6oRDIvYVsRLY6oRDT6P2bfVn1:RzWDIfRWDT621
                                      MD5:BB0F9B9992809E733EFFF8B0E562CFD6
                                      SHA1:F0BAB3CF73A04F5A689E6AFC764FEE9276992742
                                      SHA-256:C48F04FE7525AA3A3F9540889883F649726233DE021724823720A59B4F37CEAC
                                      SHA-512:AE4280AA460DC1C0301D458A3A443F6884A0BE37481737B2ADAFD72C33C55F09BED88ED239C91FE6F19CA137AC3CD7C9B8454C21D3F8E759687F701C8B3C7A16
                                      Malicious:false
                                      Preview: 9iH...}Z.4..f..J".C;"a9iH...}Z.4..f.~a........~.~.......3.U.
                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):327768
                                      Entropy (8bit):7.999367066417797
                                      Encrypted:true
                                      SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                                      MD5:2E52F446105FBF828E63CF808B721F9C
                                      SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                                      SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                                      SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                                      Malicious:false
                                      Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                      Process:C:\Users\user\Desktop\9n7miZydYC.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):37
                                      Entropy (8bit):4.486348298002912
                                      Encrypted:false
                                      SSDEEP:3:oNWXp5vcvn:oNWXpFcv
                                      MD5:A11591BB060207647B8D2E30A04C3307
                                      SHA1:78498F3EBB7B68111B258017412B2BEDC9D2F4CE
                                      SHA-256:6272B883FBAFE98ABC0CAD713CDA4B705B9A99C3E70C43C982C2FBB06297AF49
                                      SHA-512:EA14B14522B3B6DDD2FB42DF80792305DBBEF1DE11D3FD1BB52B7A6E0CBACC6846930082D9377276F7C2293C3FB221D1D6D555F914D67006CC8F8B6DDD3C4D5F
                                      Malicious:false
                                      Preview: C:\Users\user\Desktop\9n7miZydYC.exe

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.59865760202799
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:9n7miZydYC.exe
                                      File size:736256
                                      MD5:61de33a77d34a313df07dc2bdd28140a
                                      SHA1:2690f84adb2c6174aab432a61737ca892af2d206
                                      SHA256:9037afbf6a54684a77a6d0b204daa0a843555e01a9bd600545d8ae252b88fad7
                                      SHA512:9aad4399fb37f78d1e658006efdfe218607f51d630496ce7fbc1766bdd78b8f360657c8a661cf48602105f5c7d7a9c772180d5307bc3b9d5e2d2de2cdb24e4c1
                                      SSDEEP:6144:x2j8F5ve0At+vWlrOXMRzyeYlDW6PzaIm8MI8x39qflzAQnT6kygum2OMidd8P99:sj8FU9qXKueqZPeLhI8N0MQn5zdd8ld
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....j.`..............0..2...........Q... ...`....@.. ....................................@................................

                                      File Icon

                                      Icon Hash:00828e8e8686b000

                                      Static PE Info

                                      General

                                      Entrypoint:0x4b51c2
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x60BF6ABB [Tue Jun 8 13:03:55 2021 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                      Entrypoint Preview

                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xb51700x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000x5dc.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb50380x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xb31c80xb3200False0.666222795272data7.60711640242IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xb60000x5dc0x600False0.4296875data4.16106067239IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xb80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0xb60900x34cdata
                                      RT_MANIFEST0xb63ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                      Imports

                                      DLLImport
                                      mscoree.dll_CorExeMain

                                      Version Infos

                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2019
                                      Assembly Version1.0.0.0
                                      InternalNamegrlL.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameWindowsFormsApplication1
                                      ProductVersion1.0.0.0
                                      FileDescriptionWindowsFormsApplication1
                                      OriginalFilenamegrlL.exe

                                      Network Behavior

                                      Snort IDS Alerts

                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      06/09/21-08:40:48.822269TCP2025019ET TROJAN Possible NanoCore C2 60B497321665192.168.2.3103.133.106.117
                                      06/09/21-08:40:55.835305TCP2025019ET TROJAN Possible NanoCore C2 60B497331665192.168.2.3103.133.106.117
                                      06/09/21-08:41:03.048739TCP2025019ET TROJAN Possible NanoCore C2 60B497351665192.168.2.3103.133.106.117
                                      06/09/21-08:41:10.295361UDP254DNS SPOOF query response with TTL of 1 min. and no authority536063337.235.1.174192.168.2.3
                                      06/09/21-08:41:10.574958TCP2025019ET TROJAN Possible NanoCore C2 60B497391665192.168.2.3103.133.106.117
                                      06/09/21-08:41:19.210772TCP2025019ET TROJAN Possible NanoCore C2 60B497441665192.168.2.3103.133.106.117
                                      06/09/21-08:41:27.172287TCP2025019ET TROJAN Possible NanoCore C2 60B497451665192.168.2.3103.133.106.117
                                      06/09/21-08:41:35.865210TCP2025019ET TROJAN Possible NanoCore C2 60B497461665192.168.2.3103.133.106.117
                                      06/09/21-08:41:42.698348TCP2025019ET TROJAN Possible NanoCore C2 60B497471665192.168.2.3103.133.106.117
                                      06/09/21-08:41:49.419836TCP2025019ET TROJAN Possible NanoCore C2 60B497501665192.168.2.3103.133.106.117
                                      06/09/21-08:41:55.865614TCP2025019ET TROJAN Possible NanoCore C2 60B497511665192.168.2.3103.133.106.117
                                      06/09/21-08:42:02.784457TCP2025019ET TROJAN Possible NanoCore C2 60B497521665192.168.2.3103.133.106.117
                                      06/09/21-08:42:10.089038TCP2025019ET TROJAN Possible NanoCore C2 60B497531665192.168.2.3103.133.106.117

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Jun 9, 2021 08:40:48.534049034 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:48.771405935 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:48.771548986 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:48.822268963 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:49.066165924 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.066831112 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:49.351305008 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.351402044 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:49.587023020 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.629326105 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:49.663964033 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:49.949979067 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.975771904 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.975846052 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.976244926 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.976321936 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:49.976358891 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:49.976425886 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.020248890 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.211021900 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.211086988 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.211160898 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.211332083 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.211446047 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.211636066 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.211704969 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.211890936 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.211986065 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.212203979 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.212270021 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.212519884 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.212621927 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.212836027 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.212894917 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.306910992 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.448415041 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.448471069 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.448556900 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.448647976 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.448977947 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449028015 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449050903 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.449071884 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449110031 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449137926 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.449150085 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449187994 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449209929 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.449225903 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449264050 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449280024 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.449301958 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449348927 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449357986 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.449389935 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449429035 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449466944 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.449486971 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.449534893 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.686943054 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687000036 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687041044 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687081099 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687113047 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.687161922 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.687532902 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687576056 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687618971 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687657118 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687684059 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.687695980 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687724113 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.687736034 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687784910 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687829971 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687844992 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.687870026 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687889099 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.687911034 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687951088 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.687990904 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688007116 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.688030005 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688046932 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.688069105 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688116074 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688158989 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688169956 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.688198090 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688218117 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.688239098 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688277006 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688313961 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688332081 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.688354015 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688383102 CEST497321665192.168.2.3103.133.106.117
                                      Jun 9, 2021 08:40:50.688393116 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688440084 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688482046 CEST166549732103.133.106.117192.168.2.3
                                      Jun 9, 2021 08:40:50.688497066 CEST497321665192.168.2.3103.133.106.117

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Jun 9, 2021 08:40:48.458422899 CEST5543553192.168.2.337.235.1.174
                                      Jun 9, 2021 08:40:48.512447119 CEST535543537.235.1.174192.168.2.3
                                      Jun 9, 2021 08:40:55.365665913 CEST5071353192.168.2.337.235.1.174
                                      Jun 9, 2021 08:40:55.548255920 CEST535071337.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:02.682830095 CEST5898753192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:02.745002985 CEST535898737.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:10.142401934 CEST6063353192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:10.295361042 CEST536063337.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:18.862062931 CEST6361953192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:18.916666031 CEST536361937.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:26.709872961 CEST6493853192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:26.865480900 CEST536493837.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:35.439858913 CEST6194653192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:35.556212902 CEST536194637.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:42.327558041 CEST6491053192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:42.385374069 CEST536491037.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:49.047765017 CEST5633853192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:49.103404045 CEST535633837.235.1.174192.168.2.3
                                      Jun 9, 2021 08:41:55.503642082 CEST5942053192.168.2.337.235.1.174
                                      Jun 9, 2021 08:41:55.559006929 CEST535942037.235.1.174192.168.2.3
                                      Jun 9, 2021 08:42:02.421720028 CEST5878453192.168.2.337.235.1.174
                                      Jun 9, 2021 08:42:02.476983070 CEST535878437.235.1.174192.168.2.3
                                      Jun 9, 2021 08:42:09.465266943 CEST6397853192.168.2.337.235.1.174
                                      Jun 9, 2021 08:42:09.803811073 CEST536397837.235.1.174192.168.2.3

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Jun 9, 2021 08:40:48.458422899 CEST192.168.2.337.235.1.1740x4990Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:40:55.365665913 CEST192.168.2.337.235.1.1740x703bStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:02.682830095 CEST192.168.2.337.235.1.1740x78afStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:10.142401934 CEST192.168.2.337.235.1.1740xb2d8Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:18.862062931 CEST192.168.2.337.235.1.1740x94e9Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:26.709872961 CEST192.168.2.337.235.1.1740x8506Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:35.439858913 CEST192.168.2.337.235.1.1740x3e1cStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:42.327558041 CEST192.168.2.337.235.1.1740x9324Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:49.047765017 CEST192.168.2.337.235.1.1740x10b5Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:55.503642082 CEST192.168.2.337.235.1.1740x4c5dStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:42:02.421720028 CEST192.168.2.337.235.1.1740xf02eStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)
                                      Jun 9, 2021 08:42:09.465266943 CEST192.168.2.337.235.1.1740xa72fStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Jun 9, 2021 08:40:48.512447119 CEST37.235.1.174192.168.2.30x4990No error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:40:55.548255920 CEST37.235.1.174192.168.2.30x703bNo error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:02.745002985 CEST37.235.1.174192.168.2.30x78afNo error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:10.295361042 CEST37.235.1.174192.168.2.30xb2d8No error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:18.916666031 CEST37.235.1.174192.168.2.30x94e9No error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:26.865480900 CEST37.235.1.174192.168.2.30x8506No error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:35.556212902 CEST37.235.1.174192.168.2.30x3e1cNo error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:42.385374069 CEST37.235.1.174192.168.2.30x9324No error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:49.103404045 CEST37.235.1.174192.168.2.30x10b5No error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:41:55.559006929 CEST37.235.1.174192.168.2.30x4c5dNo error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:42:02.476983070 CEST37.235.1.174192.168.2.30xf02eNo error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)
                                      Jun 9, 2021 08:42:09.803811073 CEST37.235.1.174192.168.2.30xa72fNo error (0)tzitziklishop.ddns.net103.133.106.117A (IP address)IN (0x0001)

                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:08:40:03
                                      Start date:09/06/2021
                                      Path:C:\Users\user\Desktop\9n7miZydYC.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\9n7miZydYC.exe'
                                      Imagebase:0xef0000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.281977110.0000000004495000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.279167689.0000000003334000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.280854533.00000000042E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      General

                                      Start time:08:40:40
                                      Start date:09/06/2021
                                      Path:C:\Users\user\Desktop\9n7miZydYC.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xa20000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.277218336.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.463411890.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000007.00000000.277575023.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      General

                                      Start time:08:40:43
                                      Start date:09/06/2021
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC2C1.tmp'
                                      Imagebase:0x7ff672e70000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:08:40:44
                                      Start date:09/06/2021
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6b2800000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:08:40:44
                                      Start date:09/06/2021
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC67B.tmp'
                                      Imagebase:0xa0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:08:40:45
                                      Start date:09/06/2021
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6b2800000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:08:40:45
                                      Start date:09/06/2021
                                      Path:C:\Users\user\Desktop\9n7miZydYC.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\9n7miZydYC.exe 0
                                      Imagebase:0x570000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.375447688.0000000003D35000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.374531994.0000000003B89000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.372309695.0000000002BD6000.00000004.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      General

                                      Start time:08:40:47
                                      Start date:09/06/2021
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                      Imagebase:0x6d0000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.372998253.0000000002AD6000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.376242535.0000000003C35000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.374908003.0000000003A89000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 37%, ReversingLabs
                                      Reputation:low

                                      General

                                      Start time:08:40:54
                                      Start date:09/06/2021
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                      Imagebase:0xc0000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.391258363.0000000003449000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000015.00000002.388668896.0000000002496000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.392080007.00000000035F5000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      General

                                      Start time:08:41:21
                                      Start date:09/06/2021
                                      Path:C:\Users\user\Desktop\9n7miZydYC.exe
                                      Wow64 process (32bit):false
                                      Commandline:{path}
                                      Imagebase:0x350000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      General

                                      Start time:08:41:22
                                      Start date:09/06/2021
                                      Path:C:\Users\user\Desktop\9n7miZydYC.exe
                                      Wow64 process (32bit):false
                                      Commandline:{path}
                                      Imagebase:0x3b0000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      General

                                      Start time:08:41:23
                                      Start date:09/06/2021
                                      Path:C:\Users\user\Desktop\9n7miZydYC.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xc70000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.388118309.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.390678037.0000000003041000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001D.00000000.367378120.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001D.00000000.367856055.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.391222166.0000000004049000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      General

                                      Start time:08:41:23
                                      Start date:09/06/2021
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xe20000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.392510114.00000000042C9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001E.00000000.368666676.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.388846832.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001E.00000000.368132271.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.392325016.00000000032C1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      Reputation:low

                                      General

                                      Start time:08:41:30
                                      Start date:09/06/2021
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0x7a0000
                                      File size:736256 bytes
                                      MD5 hash:61DE33A77D34A313DF07DC2BDD28140A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001F.00000000.383519060.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001F.00000002.403785027.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001F.00000000.383969923.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001F.00000002.405159880.0000000002C01000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000001F.00000002.405306863.0000000003C09000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                      Disassembly

                                      Code Analysis

                                      Reset < >