Loading ...

Play interactive tourEdit tour

Analysis Report xtxr8lHa5F.exe

Overview

General Information

Sample Name:xtxr8lHa5F.exe
Analysis ID:432024
MD5:c89c05d0f2853fa30b535aa2544006e5
SHA1:2e3a6adc296d26732a3c61ac761052b8793f7da0
SHA256:b2ec2e506bc9741873e39cc6fdc07802a1180136657582ae807d5f6112cfc02a
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • xtxr8lHa5F.exe (PID: 5352 cmdline: 'C:\Users\user\Desktop\xtxr8lHa5F.exe' MD5: C89C05D0F2853FA30B535AA2544006E5)
    • schtasks.exe (PID: 3696 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rOKWrJ' /XML 'C:\Users\user\AppData\Local\Temp\tmp76E9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 5260 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
    • MSBuild.exe (PID: 5268 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
      • schtasks.exe (PID: 5020 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp604E.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 3564 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6502.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 3508 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0 MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 1648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 1180 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 1260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 3776 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "ab394965-c5ce-4154-ad1c-da01ecc2", "Group": "Mamie", "Domain1": "82.64.141.173", "Domain2": "82.64.141.173", "Port": 6666, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x59eb:$x1: NanoCore.ClientPluginHost
  • 0x5b48:$x2: IClientNetworkHost
00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x59eb:$x2: NanoCore.ClientPluginHost
  • 0x6941:$s3: PipeExists
  • 0x5be1:$s4: PipeCreated
  • 0x5a05:$s5: IClientLoggingHost
00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 49 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    19.2.MSBuild.exe.6a00000.19.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x350b:$x1: NanoCore.ClientPluginHost
    • 0x3525:$x2: IClientNetworkHost
    19.2.MSBuild.exe.6a00000.19.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x350b:$x2: NanoCore.ClientPluginHost
    • 0x52b6:$s4: PipeCreated
    • 0x34f8:$s5: IClientLoggingHost
    19.2.MSBuild.exe.6990000.14.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x605:$x1: NanoCore.ClientPluginHost
    • 0x63e:$x2: IClientNetworkHost
    19.2.MSBuild.exe.6990000.14.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x605:$x2: NanoCore.ClientPluginHost
    • 0x720:$s4: PipeCreated
    • 0x61f:$s5: IClientLoggingHost
    19.2.MSBuild.exe.69a0000.15.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x13a8:$x1: NanoCore.ClientPluginHost
    Click to see the 94 entries

    Sigma Overview

    AV Detection:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5268, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5268, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5268, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5268, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 19.2.MSBuild.exe.4182eb4.6.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "ab394965-c5ce-4154-ad1c-da01ecc2", "Group": "Mamie", "Domain1": "82.64.141.173", "Domain2": "82.64.141.173", "Port": 6666, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Roaming\rOKWrJ.exeMetadefender: Detection: 34%Perma Link
    Source: C:\Users\user\AppData\Roaming\rOKWrJ.exeReversingLabs: Detection: 65%
    Multi AV Scanner detection for submitted fileShow sources
    Source: xtxr8lHa5F.exeVirustotal: Detection: 50%Perma Link
    Source: xtxr8lHa5F.exeMetadefender: Detection: 34%Perma Link
    Source: xtxr8lHa5F.exeReversingLabs: Detection: 65%
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORY
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4171e56.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4176c82.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPE
    Source: 19.2.MSBuild.exe.6a10000.21.unpackAvira: Label: TR/NanoCore.fadte
    Source: 19.0.MSBuild.exe.400000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 19.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 19.0.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: xtxr8lHa5F.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: xtxr8lHa5F.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: mscorlib.pdb source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\fcghDRQpfO\src\obj\Debug\PH8v.pdbh source: xtxr8lHa5F.exe
    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.19.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: MSBuild.exe
    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp, dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: MSBuild.exe, 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: MSBuild.exe, 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: MSBuild.exe, 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\fcghDRQpfO\src\obj\Debug\PH8v.pdb source: xtxr8lHa5F.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49728 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49729 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49730 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49732 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49738 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49739 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49740 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49741 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49742 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 82.64.141.173:6666
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 82.64.141.173:6666
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: 82.64.141.173
    Source: global trafficTCP traffic: 192.168.2.3:49728 -> 82.64.141.173:6666
    Source: Joe Sandbox ViewASN Name: PROXADFR PROXADFR
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 184.30.21.219
    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
    Source: unknownTCP traffic detected without corresponding DNS query: 84.53.167.113
    Source: unknownTCP traffic detected without corresponding DNS query: 2.17.179.193
    Source: unknownTCP traffic detected without corresponding DNS query: 2.17.179.193
    Source: unknownTCP traffic detected without corresponding DNS query: 2.17.179.193
    Source: unknownTCP traffic detected without corresponding DNS query: 84.53.167.113
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: unknownTCP traffic detected without corresponding DNS query: 82.64.141.173
    Source: xtxr8lHa5F.exe, 00000000.00000003.215069252.0000000005DA6000.00000004.00000001.sdmpString found in binary or memory: http://en.w
    Source: xtxr8lHa5F.exe, 00000000.00000003.211876617.0000000005DBB000.00000004.00000001.sdmp, xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
    Source: xtxr8lHa5F.exe, 00000000.00000003.211876617.0000000005DBB000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.comH
    Source: MSBuild.exe, 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmpString found in binary or memory: http://google.com
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: xtxr8lHa5F.exe, 00000000.00000003.214659761.0000000005DB3000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: xtxr8lHa5F.exe, 00000000.00000003.218605869.0000000005DD5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers$M4n
    Source: xtxr8lHa5F.exe, 00000000.00000003.218605869.0000000005DD5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: xtxr8lHa5F.exe, 00000000.00000003.219470787.0000000005DD5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersW
    Source: xtxr8lHa5F.exe, 00000000.00000003.218866529.0000000005DD5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersers
    Source: xtxr8lHa5F.exe, 00000000.00000003.224743088.0000000005DDD000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersiva$M4n
    Source: xtxr8lHa5F.exe, 00000000.00000003.224801303.0000000005DDD000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerswMin(
    Source: xtxr8lHa5F.exe, 00000000.00000002.296418748.0000000001050000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comceva
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: xtxr8lHa5F.exe, 00000000.00000003.213412323.0000000005DDD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnt
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: xtxr8lHa5F.exe, 00000000.00000003.213056039.0000000005DA6000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr-e
    Source: xtxr8lHa5F.exe, 00000000.00000003.213056039.0000000005DA6000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr3
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
    Source: xtxr8lHa5F.exe, 00000000.00000003.213112990.0000000005DDD000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: xtxr8lHa5F.exe, 00000000.00000003.213056039.0000000005DA6000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krLn
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
    Source: xtxr8lHa5F.exe, 00000000.00000003.212501401.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com)
    Source: xtxr8lHa5F.exe, 00000000.00000003.212501401.0000000005DA2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comy
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
    Source: xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: xtxr8lHa5F.exe, 00000000.00000003.214926823.0000000005DAD000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyict.coJJl
    Source: xtxr8lHa5F.exe, 00000000.00000003.214926823.0000000005DAD000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49678
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
    Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
    Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49680
    Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
    Source: MSBuild.exe, 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORY
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4171e56.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4176c82.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPE

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490523889.0000000006A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490241521.0000000006970000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490460540.00000000069F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.489013213.0000000005660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.489410894.0000000005AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.490092332.0000000006860000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.490925199.0000000006C90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.489888733.00000000065C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.490328155.00000000069A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.490998411.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.6a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6990000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.69a0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6970000.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6c9e8a4.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6c90000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.69c0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6c90000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.6c94c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.4182eb4.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.5660000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6e10000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.4176c82.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.69c0000.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.69e0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.65c0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6a00000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6990000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.5ab0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.5ab0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.65c0000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6e10000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.69f0000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6860000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.69f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.3051e58.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.305e0a0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.69e0000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.6970000.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.304d01c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.304d01c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.4171e56.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.305e0a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.305e0a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.3051e58.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.3051e58.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.MSBuild.exe.4176c82.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeCode function: 0_2_005C7970
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeCode function: 0_2_0284ACE8
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeCode function: 0_2_0284BD3F
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeCode function: 0_2_0504BBD8
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeCode function: 0_2_050423EC
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeCode function: 0_2_005C24F2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_015DE471
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_015DE480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_015DBBD4
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055BF5F8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055B9788
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055B3550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055BA5E1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055BA602
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F2450
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071FEC81
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F1120
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071FA950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071FA080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F250E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F9D38
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_073D0FC8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 24_2_00D12148
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 24_2_00D15D08
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 24_2_00D14A20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 24_2_00D11A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 24_2_00D12133
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 26_2_02875858
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 26_2_02874580
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 26_2_02872148
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 26_2_02871A40
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 26_2_02872133
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 29_2_00AD4F28
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 29_2_00AD2370
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 29_2_00AD1A2F
    Source: dhcpmon.exe.19.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: dhcpmon.exe.19.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: dhcpmon.exe.19.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: xtxr8lHa5F.exeBinary or memory string: OriginalFilename vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.300992790.0000000004A40000.00000002.00000001.sdmpBinary or memory string: originalfilename vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.300992790.0000000004A40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.309069264.000000000BF70000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWindowsNetwork.dll> vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePH8v.exeD vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.305737301.0000000009050000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exe, 00000000.00000002.307039746.00000000096A0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exeBinary or memory string: OriginalFilenamePH8v.exeD vs xtxr8lHa5F.exe
    Source: xtxr8lHa5F.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490523889.0000000006A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490523889.0000000006A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490241521.0000000006970000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490241521.0000000006970000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490460540.00000000069F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490460540.00000000069F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.489013213.0000000005660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.489013213.0000000005660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.489410894.0000000005AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.489410894.0000000005AB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.490092332.0000000006860000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490092332.0000000006860000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.490925199.0000000006C90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490925199.0000000006C90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.489888733.00000000065C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.489888733.00000000065C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000013.00000002.490328155.00000000069A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490328155.00000000069A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.490998411.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000013.00000002.490998411.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.6a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6a00000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6990000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6990000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.69a0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69a0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6970000.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6970000.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6c9e8a4.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6c9e8a4.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6c90000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6c90000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.69c0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69c0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6c90000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6c90000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.6c94c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6c94c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.4182eb4.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.4182eb4.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.5660000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.5660000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6e10000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6e10000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.4176c82.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.4176c82.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.69c0000.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69c0000.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.69e0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69e0000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.65c0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.65c0000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6a00000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6a00000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6990000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6990000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.5ab0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.5ab0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.5ab0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.5ab0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.65c0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.65c0000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6e10000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6e10000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.69f0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69f0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6860000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6860000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.69f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.3051e58.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.3051e58.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.305e0a0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.305e0a0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.69e0000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.69e0000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.6970000.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.6970000.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 19.2.MSBuild.exe.304d01c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.304d01c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.4171e56.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.305e0a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.305e0a0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.3051e58.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.3051e58.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.MSBuild.exe.4176c82.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: xtxr8lHa5F.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: rOKWrJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: xtxr8lHa5F.exe, FBWintask/FBWintask.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: rOKWrJ.exe.0.dr, FBWintask/FBWintask.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 0.2.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/FBWintask.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 0.0.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/FBWintask.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: xtxr8lHa5F.exe, FBWintask/ImageCache.csTask registration methods: 'GetOrCreateContainer'
    Source: xtxr8lHa5F.exe, FBWintask/ImageCacheWorker.csTask registration methods: 'GetOrCreateContainer'
    Source: xtxr8lHa5F.exe, FBWintask/FileIO.csTask registration methods: 'CreateFile', 'ILCreateFromPathW'
    Source: rOKWrJ.exe.0.dr, FBWintask/ImageCacheWorker.csTask registration methods: 'GetOrCreateContainer'
    Source: rOKWrJ.exe.0.dr, FBWintask/ImageCache.csTask registration methods: 'GetOrCreateContainer'
    Source: rOKWrJ.exe.0.dr, FBWintask/FileIO.csTask registration methods: 'CreateFile', 'ILCreateFromPathW'
    Source: 0.2.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/ImageCacheWorker.csTask registration methods: 'GetOrCreateContainer'
    Source: 0.2.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/ImageCache.csTask registration methods: 'GetOrCreateContainer'
    Source: 0.2.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/FileIO.csTask registration methods: 'CreateFile', 'ILCreateFromPathW'
    Source: 26.2.dhcpmon.exe.600000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 26.2.dhcpmon.exe.600000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 26.0.dhcpmon.exe.600000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 26.0.dhcpmon.exe.600000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
    Source: 26.0.dhcpmon.exe.600000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
    Source: 26.0.dhcpmon.exe.600000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 26.0.dhcpmon.exe.600000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: dhcpmon.exe.19.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: dhcpmon.exe.19.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 26.2.dhcpmon.exe.600000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 26.2.dhcpmon.exe.600000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
    Source: 26.2.dhcpmon.exe.600000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
    Source: dhcpmon.exe.19.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: dhcpmon.exe.19.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
    Source: dhcpmon.exe.19.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: dhcpmon.exe, 0000001D.00000002.327268598.00000000027E1000.00000004.00000001.sdmpBinary or memory string: l)C:\Program Files (x86)\DHCP Monitor\*.sln
    Source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp, dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.drBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
    Source: dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
    Source: dhcpmon.exe, dhcpmon.exe.19.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
    Source: dhcpmon.exe, 0000001D.00000002.327268598.00000000027E1000.00000004.00000001.sdmpBinary or memory string: *.slnP#
    Source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp, dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD
    Source: dhcpmon.exe, dhcpmon.exe.19.drBinary or memory string: *.sln
    Source: dhcpmon.exe, 0000001D.00000002.326870132.00000000008F1000.00000004.00000020.sdmpBinary or memory string: \??\C:\Program Files (x86)\DHCP Monitor\<.sln
    Source: dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.drBinary or memory string: MSBuild MyApp.csproj /t:Clean
    Source: dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.drBinary or memory string: /ignoreprojectextensions:.sln
    Source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp, dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.drBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
    Source: classification engineClassification label: mal100.troj.evad.winEXE@20/14@0/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile created: C:\Users\user\AppData\Roaming\rOKWrJ.exeJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:996:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1648:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1260:120:WilError_01
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ab394965-c5ce-4154-ad1c-da01ecc2f391}
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeMutant created: \Sessions\1\BaseNamedObjects\UnHYVxJdUT
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5012:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3016:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5256:120:WilError_01
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile created: C:\Users\user\AppData\Local\Temp\tmp76E9.tmpJump to behavior
    Source: xtxr8lHa5F.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: xtxr8lHa5F.exeVirustotal: Detection: 50%
    Source: xtxr8lHa5F.exeMetadefender: Detection: 34%
    Source: xtxr8lHa5F.exeReversingLabs: Detection: 65%
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile read: C:\Users\user\Desktop\xtxr8lHa5F.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\xtxr8lHa5F.exe 'C:\Users\user\Desktop\xtxr8lHa5F.exe'
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rOKWrJ' /XML 'C:\Users\user\AppData\Local\Temp\tmp76E9.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp604E.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6502.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rOKWrJ' /XML 'C:\Users\user\AppData\Local\Temp\tmp76E9.tmp'
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp604E.tmp'
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6502.tmp'
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: xtxr8lHa5F.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: xtxr8lHa5F.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: xtxr8lHa5F.exeStatic file information: File size 1245184 > 1048576
    Source: xtxr8lHa5F.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x12be00
    Source: xtxr8lHa5F.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: xtxr8lHa5F.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: mscorlib.pdb source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\fcghDRQpfO\src\obj\Debug\PH8v.pdbh source: xtxr8lHa5F.exe
    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.19.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: MSBuild.exe
    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: MSBuild.exe, 00000013.00000002.481813725.0000000001373000.00000004.00000020.sdmp, dhcpmon.exe, 0000001A.00000002.312274650.0000000000602000.00000002.00020000.sdmp, dhcpmon.exe, 0000001D.00000002.326402171.00000000001E2000.00000002.00020000.sdmp, dhcpmon.exe.19.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: MSBuild.exe, 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: MSBuild.exe, 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: MSBuild.exe, 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\fcghDRQpfO\src\obj\Debug\PH8v.pdb source: xtxr8lHa5F.exe

    Data Obfuscation:

    barindex
    .NET source code contains potential unpackerShow sources
    Source: xtxr8lHa5F.exe, FBWintask/FBWintask.cs.Net Code: XXXXXXXXXXXXXXXXXXXXX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: rOKWrJ.exe.0.dr, FBWintask/FBWintask.cs.Net Code: XXXXXXXXXXXXXXXXXXXXX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 0.2.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/FBWintask.cs.Net Code: XXXXXXXXXXXXXXXXXXXXX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 0.0.xtxr8lHa5F.exe.5c0000.0.unpack, FBWintask/FBWintask.cs.Net Code: XXXXXXXXXXXXXXXXXXXXX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_06981338 push es; ret
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055BB5E0 push eax; retf
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055B69FA push esp; retf
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_055B69F8 pushad ; retf
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071FE120 pushad ; ret
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F09C0 push es; ret
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F09E2 push es; ret
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071FF850 push esp; iretd
    Source: initial sampleStatic PE information: section name: .text entropy: 7.95223164837
    Source: initial sampleStatic PE information: section name: .text entropy: 7.95223164837
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile created: C:\Users\user\AppData\Roaming\rOKWrJ.exeJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival:

    barindex
    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rOKWrJ' /XML 'C:\Users\user\AppData\Local\Temp\tmp76E9.tmp'

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe:Zone.Identifier read attributes | delete
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Yara detected AntiVM3Show sources
    Source: Yara matchFile source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORY
    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 240000
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239875
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239750
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239531
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239422
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239313
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239188
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239047
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238891
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238672
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238438
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237969
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237859
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237750
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237531
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237391
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237250
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237125
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237016
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236891
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236500
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236094
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235953
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235844
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235719
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235609
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235484
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235375
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235250
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235016
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234906
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234797
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234672
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234438
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234313
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234188
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234063
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233938
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233031
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232906
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232766
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232656
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232531
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232406
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232188
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232047
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231922
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231813
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231500
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231391
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231250
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231000
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230890
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230656
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230438
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230328
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230219
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230094
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229984
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229875
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229766
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229656
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229547
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeWindow / User API: threadDelayed 2457
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeWindow / User API: threadDelayed 5278
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6415
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2494
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 542
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 618
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -8301034833169293s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -240000s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239875s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239750s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239641s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239531s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239422s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239313s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239188s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -239047s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238891s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238781s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238672s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238547s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238438s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238297s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -238141s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237969s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237859s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237750s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237641s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237531s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237391s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237250s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237125s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -237016s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -236891s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -236781s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -236641s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -236500s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -236297s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -236094s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235953s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235844s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235719s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235609s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235484s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235375s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235250s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235141s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -235016s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234906s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234797s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234672s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234547s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234438s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234313s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234188s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -234063s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -233938s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -233781s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -233547s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -233297s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -233141s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -233031s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232906s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232766s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232656s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232531s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232406s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232297s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232188s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -232047s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231922s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231813s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231641s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231500s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231391s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231250s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231141s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -231000s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230890s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230781s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230656s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230547s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230438s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230328s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230219s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -230094s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -229984s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -229875s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -229766s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -229656s >= -30000s
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exe TID: 2996Thread sleep time: -229547s >= -30000s
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 400Thread sleep time: -4611686018427385s >= -30000s
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5340Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1784Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2592Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 240000
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239875
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239750
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239531
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239422
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239313
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239188
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 239047
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238891
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238672
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238438
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 238141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237969
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237859
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237750
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237531
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237391
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237250
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237125
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 237016
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236891
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236500
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 236094
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235953
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235844
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235719
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235609
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235484
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235375
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235250
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 235016
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234906
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234797
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234672
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234438
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234313
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234188
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 234063
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233938
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 233031
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232906
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232766
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232656
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232531
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232406
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232297
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232188
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 232047
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231922
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231813
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231641
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231500
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231391
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231250
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231141
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 231000
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230890
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230781
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230656
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230547
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230438
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230328
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230219
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 230094
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229984
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229875
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229766
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229656
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeThread delayed: delay time: 229547
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
    Source: MSBuild.exe, 00000013.00000002.491135295.00000000072E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: vmware
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: VMWARE
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: MSBuild.exe, 00000013.00000002.491135295.00000000072E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: MSBuild.exe, 00000013.00000002.491135295.00000000072E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
    Source: xtxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
    Source: MSBuild.exe, 00000013.00000003.359697171.00000000013F8000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: MSBuild.exe, 00000013.00000002.491135295.00000000072E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess token adjusted: Debug
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    .NET source code references suspicious native API functionsShow sources
    Source: dhcpmon.exe.19.dr, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
    Source: 19.0.MSBuild.exe.400000.1.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
    Source: 19.2.MSBuild.exe.400000.0.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
    Source: 19.0.MSBuild.exe.400000.0.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
    Source: 26.0.dhcpmon.exe.600000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
    Source: 26.2.dhcpmon.exe.600000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rOKWrJ' /XML 'C:\Users\user\AppData\Local\Temp\tmp76E9.tmp'
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp604E.tmp'
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6502.tmp'
    Source: MSBuild.exe, 00000013.00000002.485674376.00000000032C4000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: MSBuild.exe, 00000013.00000002.483060667.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: MSBuild.exe, 00000013.00000002.483060667.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: MSBuild.exe, 00000013.00000002.485327364.0000000003231000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa(l
    Source: MSBuild.exe, 00000013.00000002.483060667.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: MSBuild.exe, 00000013.00000002.486305306.00000000033E6000.00000004.00000001.sdmpBinary or memory string: Program Managerd4
    Source: MSBuild.exe, 00000013.00000002.483744566.000000000310A000.00000004.00000001.sdmpBinary or memory string: Program ManagerD$(l
    Source: MSBuild.exe, 00000013.00000002.485674376.00000000032C4000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: MSBuild.exe, 00000013.00000002.484248659.0000000003185000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa(l(
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Users\user\Desktop\xtxr8lHa5F.exe VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 19_2_071F0040 GetSystemTimes,
    Source: C:\Users\user\Desktop\xtxr8lHa5F.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORY
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4171e56.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4176c82.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPE

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: xtxr8lHa5F.exe, 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exeString found in binary or memory: NanoCore.ClientPluginHost
    Source: MSBuild.exe, 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: MSBuild.exe, 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: MSBuild.exe, 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: xtxr8lHa5F.exe PID: 5352, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5268, type: MEMORY
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a10000.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.6a14629.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4171e56.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4182eb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.MSBuild.exe.4176c82.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.xtxr8lHa5F.exe.47d1b78.4.raw.unpack, type: UNPACKEDPE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1Scheduled Task/Job11Process Injection12Masquerading2Input Capture11System Time Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/Job11Boot or Logon Initialization ScriptsScheduled Task/Job11Disable or Modify Tools1LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerSecurity Software Discovery221SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsVirtualization/Sandbox Evasion31SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 432024 Sample: xtxr8lHa5F.exe Startdate: 09/06/2021 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->55 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 10 other signatures 2->61 8 xtxr8lHa5F.exe 5 2->8         started        12 MSBuild.exe 2 2->12         started        14 dhcpmon.exe 4 2->14         started        16 dhcpmon.exe 3 2->16         started        process3 file4 47 C:\Users\user\AppData\Roaming\rOKWrJ.exe, PE32 8->47 dropped 49 C:\Users\user\AppData\Local\...\tmp76E9.tmp, XML 8->49 dropped 65 Uses schtasks.exe or at.exe to add and modify task schedules 8->65 18 MSBuild.exe 1 13 8->18         started        23 schtasks.exe 1 8->23         started        25 MSBuild.exe 8->25         started        51 C:\Users\user\AppData\...\MSBuild.exe.log, ASCII 12->51 dropped 27 conhost.exe 12->27         started        29 conhost.exe 14->29         started        31 conhost.exe 16->31         started        signatures5 process6 dnsIp7 53 82.64.141.173, 49728, 49729, 49730 PROXADFR France 18->53 43 C:\Users\user\AppData\Roaming\...\run.dat, data 18->43 dropped 45 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->45 dropped 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->63 33 schtasks.exe 1 18->33         started        35 schtasks.exe 1 18->35         started        37 conhost.exe 23->37         started        file8 signatures9 process10 process11 39 conhost.exe 33->39         started        41 conhost.exe 35->41         started       

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    xtxr8lHa5F.exe50%VirustotalBrowse
    xtxr8lHa5F.exe37%MetadefenderBrowse
    xtxr8lHa5F.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
    C:\Users\user\AppData\Roaming\rOKWrJ.exe37%MetadefenderBrowse
    C:\Users\user\AppData\Roaming\rOKWrJ.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    19.2.MSBuild.exe.6a10000.21.unpack100%AviraTR/NanoCore.fadteDownload File
    19.0.MSBuild.exe.400000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    19.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    19.0.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.comy0%Avira URL Cloudsafe
    http://www.goodfont.co.kr-e0%Avira URL Cloudsafe
    http://www.goodfont.co.kr30%Avira URL Cloudsafe
    http://www.sandoll.co.krLn0%Avira URL Cloudsafe
    http://www.fontbureau.comceva0%Avira URL Cloudsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://fontfabrik.comH0%Avira URL Cloudsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://en.w0%URL Reputationsafe
    http://en.w0%URL Reputationsafe
    http://en.w0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.zhongyict.coJJl0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.founder.com.cn/cnt0%URL Reputationsafe
    http://www.founder.com.cn/cnt0%URL Reputationsafe
    http://www.founder.com.cn/cnt0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    82.64.141.1730%Avira URL Cloudsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.tiro.com)0%Avira URL Cloudsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    82.64.141.173true
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0xtxr8lHa5F.exe, 00000000.00000003.214659761.0000000005DB3000.00000004.00000001.sdmpfalse
      high
      http://www.fontbureau.comxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.com/designersGxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designers/?xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
            high
            http://www.founder.com.cn/cn/bThextxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.tiro.comyxtxr8lHa5F.exe, 00000000.00000003.212501401.0000000005DA2000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.goodfont.co.kr-extxr8lHa5F.exe, 00000000.00000003.213056039.0000000005DA6000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.goodfont.co.kr3xtxr8lHa5F.exe, 00000000.00000003.213056039.0000000005DA6000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
              high
              http://www.sandoll.co.krLnxtxr8lHa5F.exe, 00000000.00000003.213056039.0000000005DA6000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersWxtxr8lHa5F.exe, 00000000.00000003.219470787.0000000005DD5000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.comcevaxtxr8lHa5F.exe, 00000000.00000002.296418748.0000000001050000.00000004.00000040.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.comxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                  high
                  http://fontfabrik.comHxtxr8lHa5F.exe, 00000000.00000003.211876617.0000000005DBB000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.goodfont.co.krxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://en.wxtxr8lHa5F.exe, 00000000.00000003.215069252.0000000005DA6000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comlxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.typography.netDxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cThextxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comxtxr8lHa5F.exe, 00000000.00000003.211876617.0000000005DBB000.00000004.00000001.sdmp, xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designersersxtxr8lHa5F.exe, 00000000.00000003.218866529.0000000005DD5000.00000004.00000001.sdmpfalse
                        high
                        http://www.zhongyict.coJJlxtxr8lHa5F.exe, 00000000.00000003.214926823.0000000005DAD000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cntxtxr8lHa5F.exe, 00000000.00000003.213412323.0000000005DDD000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasextxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8xtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designersiva$M4nxtxr8lHa5F.exe, 00000000.00000003.224743088.0000000005DDD000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designerswMin(xtxr8lHa5F.exe, 00000000.00000003.224801303.0000000005DDD000.00000004.00000001.sdmpfalse
                              high
                              http://www.fonts.comxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krxtxr8lHa5F.exe, 00000000.00000003.213112990.0000000005DDD000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.tiro.com)xtxr8lHa5F.exe, 00000000.00000003.212501401.0000000005DA2000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.urwpp.deDPleasextxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnxtxr8lHa5F.exe, 00000000.00000003.214926823.0000000005DAD000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namextxr8lHa5F.exe, 00000000.00000002.296654463.00000000029C1000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sakkal.comxtxr8lHa5F.exe, 00000000.00000002.304317332.0000000005F20000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/xtxr8lHa5F.exe, 00000000.00000003.218605869.0000000005DD5000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers$M4nxtxr8lHa5F.exe, 00000000.00000003.218605869.0000000005DD5000.00000004.00000001.sdmpfalse
                                      high

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      82.64.141.173
                                      unknownFrance
                                      12322PROXADFRtrue

                                      General Information

                                      Joe Sandbox Version:32.0.0 Black Diamond
                                      Analysis ID:432024
                                      Start date:09.06.2021
                                      Start time:16:56:45
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 12m 39s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:xtxr8lHa5F.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:38
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@20/14@0/1
                                      EGA Information:Failed
                                      HDC Information:
                                      • Successful, ratio: 0.9% (good quality ratio 0.8%)
                                      • Quality average: 40.9%
                                      • Quality standard deviation: 22.3%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .exe
                                      Warnings:
                                      Show All
                                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                      • TCP Packets have been reduced to 100
                                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 104.43.139.144, 52.147.198.201, 92.122.145.220, 13.64.90.137, 168.61.161.212, 184.30.20.56, 20.82.210.154, 2.20.142.210, 2.20.142.209, 20.54.26.129, 92.122.213.194, 92.122.213.247
                                      • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      16:57:37API Interceptor304x Sleep call for process: xtxr8lHa5F.exe modified
                                      16:58:22Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" s>$(Arg0)
                                      16:58:22API Interceptor690x Sleep call for process: MSBuild.exe modified
                                      16:58:22AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      16:58:23Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                                      Joe Sandbox View / Context

                                      IPs

                                      No context

                                      Domains

                                      No context

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      PROXADFRXPChvE6GQdGet hashmaliciousBrowse
                                      • 91.174.106.122
                                      networkservice.exeGet hashmaliciousBrowse
                                      • 78.199.3.202
                                      z3hir.binGet hashmaliciousBrowse
                                      • 78.206.151.134
                                      IMG001.exeGet hashmaliciousBrowse
                                      • 82.231.211.245
                                      h15v4Z591T.exeGet hashmaliciousBrowse
                                      • 212.27.48.10
                                      73V5c6ESki.exeGet hashmaliciousBrowse
                                      • 212.27.48.10
                                      Thq0FVrAAZ.exeGet hashmaliciousBrowse
                                      • 212.27.48.10
                                      FB11.exeGet hashmaliciousBrowse
                                      • 91.160.55.21
                                      1.shGet hashmaliciousBrowse
                                      • 62.147.248.49
                                      PDFXCview.exeGet hashmaliciousBrowse
                                      • 88.188.224.42
                                      HUahIwV82u.exeGet hashmaliciousBrowse
                                      • 82.64.20.171
                                      kYfGJIQBJ3.exeGet hashmaliciousBrowse
                                      • 78.198.121.158
                                      Io8ic2291n.docGet hashmaliciousBrowse
                                      • 78.206.229.130
                                      wEcncyxrEeGet hashmaliciousBrowse
                                      • 78.199.170.243
                                      mozi.a.zipGet hashmaliciousBrowse
                                      • 82.253.85.237
                                      WUHU95Apq3Get hashmaliciousBrowse
                                      • 78.253.18.229
                                      bin.shGet hashmaliciousBrowse
                                      • 78.239.138.225
                                      evapi.exeGet hashmaliciousBrowse
                                      • 82.64.68.235
                                      mssecsvr.exeGet hashmaliciousBrowse
                                      • 78.200.246.23
                                      iGet hashmaliciousBrowse
                                      • 91.166.162.40

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeGpnPv433gb.exeGet hashmaliciousBrowse
                                        MPT Q2106-0405.exeGet hashmaliciousBrowse
                                          http___pbfoa.org_d.exeGet hashmaliciousBrowse
                                            4.exeGet hashmaliciousBrowse
                                              Payment Copy.exeGet hashmaliciousBrowse
                                                SOA.exeGet hashmaliciousBrowse
                                                  CN-Invoice-XXXXX9808-1901114328710090.pdf.exeGet hashmaliciousBrowse
                                                    SOA.exeGet hashmaliciousBrowse
                                                      4Vy2EGhzNF.exeGet hashmaliciousBrowse
                                                        PO-13916.jpeg.exeGet hashmaliciousBrowse
                                                          Balance Payment.exeGet hashmaliciousBrowse
                                                            updated statement.exeGet hashmaliciousBrowse
                                                              Quotation.exeGet hashmaliciousBrowse
                                                                DHL On Demand Delivery.exeGet hashmaliciousBrowse
                                                                  DHL On Demand Delivery.pdf.exeGet hashmaliciousBrowse
                                                                    S4aES2mPdl.exeGet hashmaliciousBrowse
                                                                      Remcos Professional Cracked By Alcatraz3222.exeGet hashmaliciousBrowse
                                                                        shipping documents.exeGet hashmaliciousBrowse
                                                                          e98ba3ccd39858a7416e4769ae962ce5.exeGet hashmaliciousBrowse
                                                                            CN-Invoice-XXXXX9808-190111432879905.exeGet hashmaliciousBrowse

                                                                              Created / dropped Files

                                                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):261728
                                                                              Entropy (8bit):6.1750840449797675
                                                                              Encrypted:false
                                                                              SSDEEP:3072:Mao0QHGUQWWimj9q/NLpj/WWqvAw2XpFU4rwOe4ubZSif02RFi/x2uv9FeP:boZTTWxxqVpqWVRXfr802biprVu
                                                                              MD5:D621FD77BD585874F9686D3A76462EF1
                                                                              SHA1:ABCAE05EE61EE6292003AABD8C80583FA49EDDA2
                                                                              SHA-256:2CA7CF7146FB8209CF3C6CECB1C5AA154C61E046DC07AFA05E8158F2C0DDE2F6
                                                                              SHA-512:2D85A81D708ECC8AF9A1273143C94DA84E632F1E595E22F54B867225105A1D0A44F918F0FAE6F1EB15ECF69D75B6F4616699776A16A2AA8B5282100FD15CA74C
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Joe Sandbox View:
                                                                              • Filename: GpnPv433gb.exe, Detection: malicious, Browse
                                                                              • Filename: MPT Q2106-0405.exe, Detection: malicious, Browse
                                                                              • Filename: http___pbfoa.org_d.exe, Detection: malicious, Browse
                                                                              • Filename: 4.exe, Detection: malicious, Browse
                                                                              • Filename: Payment Copy.exe, Detection: malicious, Browse
                                                                              • Filename: SOA.exe, Detection: malicious, Browse
                                                                              • Filename: CN-Invoice-XXXXX9808-1901114328710090.pdf.exe, Detection: malicious, Browse
                                                                              • Filename: SOA.exe, Detection: malicious, Browse
                                                                              • Filename: 4Vy2EGhzNF.exe, Detection: malicious, Browse
                                                                              • Filename: PO-13916.jpeg.exe, Detection: malicious, Browse
                                                                              • Filename: Balance Payment.exe, Detection: malicious, Browse
                                                                              • Filename: updated statement.exe, Detection: malicious, Browse
                                                                              • Filename: Quotation.exe, Detection: malicious, Browse
                                                                              • Filename: DHL On Demand Delivery.exe, Detection: malicious, Browse
                                                                              • Filename: DHL On Demand Delivery.pdf.exe, Detection: malicious, Browse
                                                                              • Filename: S4aES2mPdl.exe, Detection: malicious, Browse
                                                                              • Filename: Remcos Professional Cracked By Alcatraz3222.exe, Detection: malicious, Browse
                                                                              • Filename: shipping documents.exe, Detection: malicious, Browse
                                                                              • Filename: e98ba3ccd39858a7416e4769ae962ce5.exe, Detection: malicious, Browse
                                                                              • Filename: CN-Invoice-XXXXX9808-190111432879905.exe, Detection: malicious, Browse
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z.........."...0..|...B......n.... ........@.. ....................................`.....................................O........>..............`>.......................................................... ............... ..H............text....z... ...|.................. ..`.rsrc....>.......@...~..............@..@.reloc..............................@..B................P.......H.......8)...................|.........................................*.{.......*v.(=....r...p({...-..+..}....*....0..%........(....-..*....(z.....&..}.........*.*....................0..5........(....-..*.-.r+..ps>...z.....i(z.....&..}.........*.*............%......>....(?...(....*N..(@....oA...(....*:...(B...(....*:...(C...(....**....(....*....0..G........(....,..*..(....-...}.....*.r...p(x...&.(v.....}......&..}.........*.*..........7.......0..f........-.r7..ps>...z .....
                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):841
                                                                              Entropy (8bit):5.356220854328477
                                                                              Encrypted:false
                                                                              SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoIvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHwvEHxDqHj
                                                                              MD5:486580834B084C92AE1F3866166C9C34
                                                                              SHA1:C8EB7E1CEF55A6C9EB931487E9AA4A2098AACEDF
                                                                              SHA-256:65C5B1213E371D449E2A239557A5F250FEA1D3473A1B5C4C5FF7492085F663FB
                                                                              SHA-512:2C54B638A52AA87F47CAB50859EFF98F07DA02993A596686B5617BA99E73ABFCD104F0F33209E24AFB32E66B4B8A225D4DB2CC79631540C21E7E8C4573DFD457
                                                                              Malicious:true
                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):1037
                                                                              Entropy (8bit):5.371216502395632
                                                                              Encrypted:false
                                                                              SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7KvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHhAHKzvKvEHxD0
                                                                              MD5:C7F28B87C2CAD111D929CB9A0FF822F8
                                                                              SHA1:C2CF9E7A3F6EFD9000FE76EBE54E4E9AE5754267
                                                                              SHA-256:D1B02C20EACF464229AB063FA947A525E2ED7772259A8F70C7205DC13599EAE6
                                                                              SHA-512:E0F35874E02AB672CFF0553A0DA0864DAB14C05733D06395E4D0C9CDFC6F445E940310F8D01E3E1B28895F636DFBC1F510E103D1C46818400BA4E7371D8F254D
                                                                              Malicious:false
                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral,
                                                                              C:\Users\user\AppData\Local\Temp\tmp604E.tmp
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1320
                                                                              Entropy (8bit):5.137611098420233
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0moxtn:cbk4oL600QydbQxIYODOLedq3Zoj
                                                                              MD5:3E2B26ED8B75AE83A269595180E84EF6
                                                                              SHA1:D30A0335FCCE406BCA8BA5764288235E6192F608
                                                                              SHA-256:108BE30AEB8EB31C185A39A6726F26DACBC4E4124951C61A29ADE4B7038C71EA
                                                                              SHA-512:B6981C68FCB886CC8379A068B96931B9D4F5CC5AA9BDC467E36C4168FE6C5273A2A84D8850B12C11703EC03AC6B1F1950D1E669EFCB59FC2402CE4BBA9DC03D3
                                                                              Malicious:false
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                              C:\Users\user\AppData\Local\Temp\tmp6502.tmp
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1310
                                                                              Entropy (8bit):5.109425792877704
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                              Malicious:false
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                              C:\Users\user\AppData\Local\Temp\tmp76E9.tmp
                                                                              Process:C:\Users\user\Desktop\xtxr8lHa5F.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1639
                                                                              Entropy (8bit):5.186784683335912
                                                                              Encrypted:false
                                                                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBItn:cbh47TlNQ//rydbz9I3YODOLNdq3I
                                                                              MD5:EE08731F2635FB10A5E1E6F0747AB40F
                                                                              SHA1:E0D3F0D3F2177ECC73C45479FA66DFC14C5306DF
                                                                              SHA-256:E441C2F354D1D3AA8DA9E3B2CB2737C95905B88DF668C2F9D111C9A4D2025E52
                                                                              SHA-512:F4504B5AAA6354ED918586F2DEF5A21DB83F9EEBC7121FBC8B3FB4370A3B8BD06E5315ED35AA3D094C83B360CE6431FC22B808627F56DF866F6ADDEF76C84023
                                                                              Malicious:true
                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1856
                                                                              Entropy (8bit):7.024371743172393
                                                                              Encrypted:false
                                                                              SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCr
                                                                              MD5:838CD9DBC78EA45A5406EAE23962086D
                                                                              SHA1:C8273AACDEE03AC0CDCDDBAA83F51D04D6A4203C
                                                                              SHA-256:6E11A62511C5BBC0413128305069B780C448684B54FAA3E8DD0B4FD3DB8C9867
                                                                              SHA-512:F7D25EF1FA6F50667DD6785CC774E0AA6BC52A2231FE96E7C59D14EFDFDDA076F6399288CF6EAC8EFA8A75727893432AA155DA0E392F8CD1F26C5C5871EAC6B5
                                                                              Malicious:false
                                                                              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):8
                                                                              Entropy (8bit):3.0
                                                                              Encrypted:false
                                                                              SSDEEP:3:i18tn:i18n
                                                                              MD5:8531FB0CEC5F18EBD29FF0B57BC853B0
                                                                              SHA1:D7ACB93014DF7917C55380CE5F8E2C10D0E12EBE
                                                                              SHA-256:A393F6022ED56CAF64A0865D97006C38620212D769CE5EA8B924683B700A1754
                                                                              SHA-512:E758D525129048796999A0AF64054AF4CC54096DEDE42D4D2D0375F91847AF4DEAC2019606E4E15D31ED9462CED8718A8E088F86856D1DEA8ADDE395FAE9ED53
                                                                              Malicious:true
                                                                              Preview: ...u.+.H
                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):40
                                                                              Entropy (8bit):5.221928094887364
                                                                              Encrypted:false
                                                                              SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                                                                              MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                                                                              SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                                                                              SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                                                                              SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                                                                              Malicious:false
                                                                              Preview: 9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):57
                                                                              Entropy (8bit):4.887726803973036
                                                                              Encrypted:false
                                                                              SSDEEP:3:oMty8WddSJ8:oMLW6C
                                                                              MD5:6ECAFC0490DAB08E4A288E0042B6B613
                                                                              SHA1:4A4529907588505FC65CC9933980CFE6E576B3D6
                                                                              SHA-256:DC5F76FBF44B3E6CDDC14EA9E5BB9B6BD3A955197FE13F33F7DDA7ECC08E79E0
                                                                              SHA-512:7DA2B02627A36C8199814C250A1FBD61A9C18E098F8D691C11D75044E7F51DBD52C31EC2E1EA8CDEE5077ADCCB8CD247266F191292DB661FE7EA1B613FC646F8
                                                                              Malicious:false
                                                                              Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              C:\Users\user\AppData\Roaming\rOKWrJ.exe
                                                                              Process:C:\Users\user\Desktop\xtxr8lHa5F.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1245184
                                                                              Entropy (8bit):7.948556128818863
                                                                              Encrypted:false
                                                                              SSDEEP:24576:4ZBPnHeenJNTfyZbKldRTBeRmZPpYKH2k4mLM:4BeWTfyZbqdR1eCYQ4
                                                                              MD5:C89C05D0F2853FA30B535AA2544006E5
                                                                              SHA1:2E3A6ADC296D26732A3C61AC761052B8793F7DA0
                                                                              SHA-256:B2EC2E506BC9741873E39CC6FDC07802A1180136657582AE807D5F6112CFC02A
                                                                              SHA-512:BA3ECE975821799AEE081C04ED73027C4D389AD97B237E2F65D454181922EBAC7ECACF08783046A3E51C67CD283118BA57EF6F6BB6F9918F284084EBAE1D3378
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Metadefender, Detection: 37%, Browse
                                                                              • Antivirus: ReversingLabs, Detection: 66%
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....X.`..............0......@........... ........@.. .......................@.......[....@.................................@...O........=................... ....................................................... ............... ..H............text........ ...................... ..`.rsrc....=.......>..................@..@.reloc....... ......................@..B................t.......H.......d...4...............p7..........................................".(.....*..{....*"..}....*..{....*"..}....*..0............(.........,..r...p(.......+m.......(....s......(........o....t......r=..p(.........5.,..o......&.r...p(............r...p..(....(..........*....(....7..V..........Ba..........Br.......0...........r+..p.+..*..0...........r5..p.+..*..( ...... .d...(!..... .....(!......K..s"...(#....*F...($.....(%....*~...(&......}......}.....(%....*v...('......o(...}.
                                                                              \Device\ConDrv
                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):298
                                                                              Entropy (8bit):4.943030742860529
                                                                              Encrypted:false
                                                                              SSDEEP:6:zx3M1tFAbQtU1R30qyMstwYVoRRZBXVN+J0fFdCsq2UTiMdH8stCal+n:zK13I30ZMt9BFN+QdCT2UftCM+
                                                                              MD5:6A9888952541A41F033EB114C24DC902
                                                                              SHA1:41903D7C8F31013C44572E09D97B9AAFBBCE77E6
                                                                              SHA-256:41A61D0084CD7884BEA1DF02ED9213CB8C83F4034F5C8156FC5B06D6A3E133CE
                                                                              SHA-512:E6AC898E67B4052375FDDFE9894B26D504A7827917BF3E02772CFF45C3FA7CC5E0EFFDC701D208E0DB89F05E42F195B1EC890F316BEE5CB8239AB45444DAA65E
                                                                              Malicious:false
                                                                              Preview: Microsoft (R) Build Engine version 4.7.3056.0..[Microsoft .NET Framework, version 4.0.30319.42000]..Copyright (C) Microsoft Corporation. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                              Static File Info

                                                                              General

                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Entropy (8bit):7.948556128818863
                                                                              TrID:
                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                              • Windows Screen Saver (13104/52) 0.07%
                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                              File name:xtxr8lHa5F.exe
                                                                              File size:1245184
                                                                              MD5:c89c05d0f2853fa30b535aa2544006e5
                                                                              SHA1:2e3a6adc296d26732a3c61ac761052b8793f7da0
                                                                              SHA256:b2ec2e506bc9741873e39cc6fdc07802a1180136657582ae807d5f6112cfc02a
                                                                              SHA512:ba3ece975821799aee081c04ed73027c4d389ad97b237e2f65d454181922ebac7ecacf08783046a3e51c67cd283118ba57ef6f6bb6f9918f284084ebae1d3378
                                                                              SSDEEP:24576:4ZBPnHeenJNTfyZbKldRTBeRmZPpYKH2k4mLM:4BeWTfyZbqdR1eCYQ4
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....X.`..............0......@........... ........@.. .......................@.......[....@................................

                                                                              File Icon

                                                                              Icon Hash:c4e0696969796843

                                                                              Static PE Info

                                                                              General

                                                                              Entrypoint:0x52dc92
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                              Time Stamp:0x60BA58E6 [Fri Jun 4 16:46:30 2021 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:v4.0.30319
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                              Entrypoint Preview

                                                                              Instruction
                                                                              jmp dword ptr [00402000h]
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add dword ptr [eax], eax
                                                                              add byte ptr [eax], al

                                                                              Data Directories

                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x12dc400x4f.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x12e0000x3db0.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1320000xc.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x12db080x1c.text
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                              Sections

                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x20000x12bcb00x12be00False0.948363901626data7.95223164837IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                              .rsrc0x12e0000x3db00x3e00False0.926033266129data7.68775853308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0x1320000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                              Resources

                                                                              NameRVASizeTypeLanguageCountry
                                                                              RT_ICON0x12e1380x3938PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                              RT_GROUP_ICON0x131a700x14data
                                                                              RT_VERSION0x131a840x32cdata

                                                                              Imports

                                                                              DLLImport
                                                                              mscoree.dll_CorExeMain

                                                                              Version Infos

                                                                              DescriptionData
                                                                              Translation0x0000 0x04b0
                                                                              LegalCopyrightCopyright 2015
                                                                              Assembly Version1.0.0.0
                                                                              InternalNamePH8v.exe
                                                                              FileVersion1.0.0.0
                                                                              CompanyName
                                                                              LegalTrademarks
                                                                              Comments
                                                                              ProductNameWinFormsFBWintask
                                                                              ProductVersion1.0.0.0
                                                                              FileDescriptionWinFormsFBWintask
                                                                              OriginalFilenamePH8v.exe

                                                                              Network Behavior

                                                                              Snort IDS Alerts

                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                              06/09/21-16:58:25.207531TCP2025019ET TROJAN Possible NanoCore C2 60B497286666192.168.2.382.64.141.173
                                                                              06/09/21-16:58:32.018797TCP2025019ET TROJAN Possible NanoCore C2 60B497296666192.168.2.382.64.141.173
                                                                              06/09/21-16:58:38.035640TCP2025019ET TROJAN Possible NanoCore C2 60B497306666192.168.2.382.64.141.173
                                                                              06/09/21-16:58:44.066081TCP2025019ET TROJAN Possible NanoCore C2 60B497326666192.168.2.382.64.141.173
                                                                              06/09/21-16:58:50.004987TCP2025019ET TROJAN Possible NanoCore C2 60B497386666192.168.2.382.64.141.173
                                                                              06/09/21-16:58:56.037031TCP2025019ET TROJAN Possible NanoCore C2 60B497396666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:03.038875TCP2025019ET TROJAN Possible NanoCore C2 60B497406666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:09.644432TCP2025019ET TROJAN Possible NanoCore C2 60B497416666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:15.672476TCP2025019ET TROJAN Possible NanoCore C2 60B497426666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:21.725158TCP2025019ET TROJAN Possible NanoCore C2 60B497456666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:27.712404TCP2025019ET TROJAN Possible NanoCore C2 60B497466666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:34.173339TCP2025019ET TROJAN Possible NanoCore C2 60B497476666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:40.286502TCP2025019ET TROJAN Possible NanoCore C2 60B497486666192.168.2.382.64.141.173
                                                                              06/09/21-16:59:46.274972TCP2025019ET TROJAN Possible NanoCore C2 60B497496666192.168.2.382.64.141.173

                                                                              Network Port Distribution

                                                                              TCP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jun 9, 2021 16:57:33.628858089 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629214048 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629300117 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629395962 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629430056 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629452944 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629561901 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.629626036 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.666960001 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.666994095 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.667005062 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.667098999 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.667733908 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.667752981 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.667956114 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.668067932 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.668612003 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.668749094 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.668808937 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.669581890 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.669603109 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.669614077 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.669686079 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:33.669914007 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.669998884 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.705794096 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.706057072 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.789659977 CEST44349683204.79.197.200192.168.2.3
                                                                              Jun 9, 2021 16:57:33.789736986 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:56.303672075 CEST49687443192.168.2.3184.30.21.219
                                                                              Jun 9, 2021 16:57:56.303759098 CEST4968880192.168.2.393.184.220.29
                                                                              Jun 9, 2021 16:57:56.346215010 CEST49683443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:56.347877026 CEST4968480192.168.2.393.184.220.29
                                                                              Jun 9, 2021 16:57:56.378303051 CEST49694443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:57:56.378386974 CEST49693443192.168.2.3204.79.197.200
                                                                              Jun 9, 2021 16:58:05.091290951 CEST4434967820.190.160.75192.168.2.3
                                                                              Jun 9, 2021 16:58:05.173636913 CEST4434973320.190.160.75192.168.2.3
                                                                              Jun 9, 2021 16:58:23.878735065 CEST4968180192.168.2.393.184.221.240
                                                                              Jun 9, 2021 16:58:23.920917034 CEST804968193.184.221.240192.168.2.3
                                                                              Jun 9, 2021 16:58:23.922202110 CEST4968180192.168.2.393.184.221.240
                                                                              Jun 9, 2021 16:58:24.798937082 CEST4968680192.168.2.384.53.167.113
                                                                              Jun 9, 2021 16:58:24.799076080 CEST49685443192.168.2.32.17.179.193
                                                                              Jun 9, 2021 16:58:24.841373920 CEST443496852.17.179.193192.168.2.3
                                                                              Jun 9, 2021 16:58:24.841396093 CEST443496852.17.179.193192.168.2.3
                                                                              Jun 9, 2021 16:58:24.841428041 CEST804968684.53.167.113192.168.2.3
                                                                              Jun 9, 2021 16:58:24.841439009 CEST49685443192.168.2.32.17.179.193
                                                                              Jun 9, 2021 16:58:24.841479063 CEST49685443192.168.2.32.17.179.193
                                                                              Jun 9, 2021 16:58:24.841495037 CEST4968680192.168.2.384.53.167.113
                                                                              Jun 9, 2021 16:58:24.886971951 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:24.947665930 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:24.947789907 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.207530975 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.272695065 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:25.283700943 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.343135118 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:25.374186993 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.457417965 CEST804967993.184.220.29192.168.2.3
                                                                              Jun 9, 2021 16:58:25.457542896 CEST4967980192.168.2.393.184.220.29
                                                                              Jun 9, 2021 16:58:25.479621887 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:25.479881048 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.580131054 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:25.583965063 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:25.660335064 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.720210075 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:25.800565958 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.869061947 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:25.973047018 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:26.011317015 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:26.070749044 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:26.072696924 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:26.131933928 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:26.298748016 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:26.657011986 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:26.764899969 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:26.991673946 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:27.093017101 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:27.093075037 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:27.202115059 CEST66664972882.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:27.832046032 CEST497286666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:31.958240986 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.017805099 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.018068075 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.018796921 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.085375071 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.100327969 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.161004066 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.162120104 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.265333891 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.372282982 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.373181105 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.433351040 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.443183899 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.503273964 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.505208969 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.564604044 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.564718008 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:32.671423912 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:32.956116915 CEST497296666192.168.2.382.64.141.173
                                                                              Jun 9, 2021 16:58:33.063976049 CEST66664972982.64.141.173192.168.2.3
                                                                              Jun 9, 2021 16:58:33.111573935 CEST66664972982.64.141.173192.168.2.3

                                                                              UDP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jun 9, 2021 16:57:29.613032103 CEST5128153192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:29.664172888 CEST53512818.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:30.541265965 CEST4919953192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:30.594149113 CEST53491998.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:31.480681896 CEST5062053192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:31.532385111 CEST53506208.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:31.692465067 CEST6493853192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:31.755882025 CEST53649388.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:32.948966980 CEST6015253192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:33.001765013 CEST53601528.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:34.006227970 CEST5754453192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:34.056139946 CEST53575448.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:34.913014889 CEST5598453192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:34.962992907 CEST53559848.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:35.827965975 CEST6418553192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:35.879328012 CEST53641858.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:36.654052019 CEST6511053192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:36.708568096 CEST53651108.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:37.585887909 CEST5836153192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:37.635910034 CEST53583618.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:38.725214005 CEST6349253192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:38.778487921 CEST53634928.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:40.143404007 CEST6083153192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:40.196477890 CEST53608318.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:41.098058939 CEST6010053192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:41.159636021 CEST53601008.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:42.543603897 CEST5319553192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:42.601840019 CEST53531958.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:43.524739027 CEST5014153192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:43.577733040 CEST53501418.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:44.504780054 CEST5302353192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:44.555285931 CEST53530238.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:45.595212936 CEST4956353192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:45.647730112 CEST53495638.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:46.504523993 CEST5135253192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:46.562860012 CEST53513528.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:47.967144012 CEST5934953192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:48.017147064 CEST53593498.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:57:49.246535063 CEST5708453192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:57:49.296648026 CEST53570848.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:58:03.015013933 CEST5882353192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:58:03.073262930 CEST53588238.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:58:05.950804949 CEST5756853192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:58:06.020395041 CEST53575688.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:58:24.036393881 CEST5054053192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:58:24.098020077 CEST53505408.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:58:43.167129040 CEST5436653192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:58:43.233901024 CEST53543668.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:58:46.928185940 CEST5303453192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:58:46.991085052 CEST53530348.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:59:18.198232889 CEST5776253192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:59:18.270220041 CEST53577628.8.8.8192.168.2.3
                                                                              Jun 9, 2021 16:59:19.266494989 CEST5543553192.168.2.38.8.8.8
                                                                              Jun 9, 2021 16:59:19.333344936 CEST53554358.8.8.8192.168.2.3

                                                                              Code Manipulations

                                                                              Statistics

                                                                              Behavior

                                                                              Click to jump to process

                                                                              System Behavior

                                                                              General

                                                                              Start time:16:57:37
                                                                              Start date:09/06/2021
                                                                              Path:C:\Users\user\Desktop\xtxr8lHa5F.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\Desktop\xtxr8lHa5F.exe'
                                                                              Imagebase:0x5c0000
                                                                              File size:1245184 bytes
                                                                              MD5 hash:C89C05D0F2853FA30B535AA2544006E5
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.300718477.00000000047D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.297955225.00000000039C1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              Reputation:low

                                                                              General

                                                                              Start time:16:58:15
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rOKWrJ' /XML 'C:\Users\user\AppData\Local\Temp\tmp76E9.tmp'
                                                                              Imagebase:0xcf0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:15
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6b2800000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:16
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:{path}
                                                                              Imagebase:0x7ff6741d0000
                                                                              File size:261728 bytes
                                                                              MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:16:58:16
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0xc40000
                                                                              File size:261728 bytes
                                                                              MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490364012.00000000069C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.490572775.0000000006A10000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490523889.0000000006A00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490523889.0000000006A00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490241521.0000000006970000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490241521.0000000006970000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490432497.00000000069E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490460540.00000000069F0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490460540.00000000069F0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490307408.0000000006990000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.489013213.0000000005660000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.489013213.0000000005660000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.489410894.0000000005AB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.489410894.0000000005AB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.293794804.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490092332.0000000006860000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490092332.0000000006860000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490925199.0000000006C90000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490925199.0000000006C90000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.477945079.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.483305536.0000000003021000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.489888733.00000000065C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.489888733.00000000065C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490328155.00000000069A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490328155.00000000069A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.294410455.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.487426729.0000000004169000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.490998411.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.490998411.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:16:58:20
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp604E.tmp'
                                                                              Imagebase:0x7ff6741d0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:20
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6b2800000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:21
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp6502.tmp'
                                                                              Imagebase:0x8d0000
                                                                              File size:185856 bytes
                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:21
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6b2800000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:22
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0
                                                                              Imagebase:0x450000
                                                                              File size:261728 bytes
                                                                              MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:16:58:23
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6b2800000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              General

                                                                              Start time:16:58:23
                                                                              Start date:09/06/2021
                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                              Imagebase:0x600000
                                                                              File size:261728 bytes
                                                                              MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Antivirus matches:
                                                                              • Detection: 0%, Metadefender, Browse
                                                                              • Detection: 0%, ReversingLabs
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:16:58:24
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6b2800000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language

                                                                              General

                                                                              Start time:16:58:30
                                                                              Start date:09/06/2021
                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                              Imagebase:0x1e0000
                                                                              File size:261728 bytes
                                                                              MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET

                                                                              General

                                                                              Start time:16:58:31
                                                                              Start date:09/06/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6b2800000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language

                                                                              Disassembly

                                                                              Code Analysis

                                                                              Reset < >