Loading ...

Play interactive tourEdit tour

Windows Analysis Report RFQ 10 UNIT.exe

Overview

General Information

Sample Name:RFQ 10 UNIT.exe
Analysis ID:451100
MD5:97904d814bcda66efe2d278ef92da65f
SHA1:6ce40705c8de4e3c8efb1857deb76357ac500df7
SHA256:d4a810dc5c1bf6cfcedaf05d46a9230250ce314cc19082ca044763dcd9ff7135
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • RFQ 10 UNIT.exe (PID: 3096 cmdline: 'C:\Users\user\Desktop\RFQ 10 UNIT.exe' MD5: 97904D814BCDA66EFE2D278EF92DA65F)
    • RFQ 10 UNIT.exe (PID: 4572 cmdline: C:\Users\user\Desktop\RFQ 10 UNIT.exe MD5: 97904D814BCDA66EFE2D278EF92DA65F)
    • RFQ 10 UNIT.exe (PID: 1540 cmdline: C:\Users\user\Desktop\RFQ 10 UNIT.exe MD5: 97904D814BCDA66EFE2D278EF92DA65F)
  • dhcpmon.exe (PID: 4076 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 97904D814BCDA66EFE2D278EF92DA65F)
    • dhcpmon.exe (PID: 1396 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 97904D814BCDA66EFE2D278EF92DA65F)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xb4357:$a: NanoCore
      • 0xb437c:$a: NanoCore
      • 0xb43d5:$a: NanoCore
      • 0xc4574:$a: NanoCore
      • 0xc459a:$a: NanoCore
      • 0xc45f6:$a: NanoCore
      • 0xd144d:$a: NanoCore
      • 0xd14a6:$a: NanoCore
      • 0xd14d9:$a: NanoCore
      • 0xd1705:$a: NanoCore
      • 0xd1781:$a: NanoCore
      • 0xd1d9a:$a: NanoCore
      • 0xd1ee3:$a: NanoCore
      • 0xd23b7:$a: NanoCore
      • 0xd269e:$a: NanoCore
      • 0xd26b5:$a: NanoCore
      • 0xdb559:$a: NanoCore
      • 0xdb5d5:$a: NanoCore
      • 0xddeb8:$a: NanoCore
      • 0xe3481:$a: NanoCore
      • 0xe34fb:$a: NanoCore
      Click to see the 3 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      8.2.RFQ 10 UNIT.exe.476b80e.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x3d99:$x1: NanoCore.ClientPluginHost
      • 0xcd3b:$x1: NanoCore.ClientPluginHost
      • 0x3db3:$x2: IClientNetworkHost
      • 0xcd55:$x2: IClientNetworkHost
      8.2.RFQ 10 UNIT.exe.476b80e.12.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0x3d99:$x2: NanoCore.ClientPluginHost
      • 0xcd3b:$x2: NanoCore.ClientPluginHost
      • 0x4dce:$s4: PipeCreated
      • 0x3d86:$s5: IClientLoggingHost
      • 0xcd28:$s5: IClientLoggingHost
      8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x8ba5:$x1: NanoCore.ClientPluginHost
      • 0x15d1f:$x1: NanoCore.ClientPluginHost
      • 0x1fb7f:$x1: NanoCore.ClientPluginHost
      • 0x27ab5:$x1: NanoCore.ClientPluginHost
      • 0x2da98:$x1: NanoCore.ClientPluginHost
      • 0x37513:$x1: NanoCore.ClientPluginHost
      • 0x4194f:$x1: NanoCore.ClientPluginHost
      • 0x4c941:$x1: NanoCore.ClientPluginHost
      • 0x586f7:$x1: NanoCore.ClientPluginHost
      • 0x6444e:$x1: NanoCore.ClientPluginHost
      • 0x8bd2:$x2: IClientNetworkHost
      • 0x15d58:$x2: IClientNetworkHost
      • 0x1fbb8:$x2: IClientNetworkHost
      • 0x27aee:$x2: IClientNetworkHost
      • 0x37670:$x2: IClientNetworkHost
      • 0x41988:$x2: IClientNetworkHost
      • 0x4c95b:$x2: IClientNetworkHost
      • 0x58711:$x2: IClientNetworkHost
      • 0x6448b:$x2: IClientNetworkHost
      8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x8b7f:$a: NanoCore
      • 0x8ba5:$a: NanoCore
      • 0x8c01:$a: NanoCore
      • 0x15a67:$a: NanoCore
      • 0x15ac0:$a: NanoCore
      • 0x15af3:$a: NanoCore
      • 0x15d1f:$a: NanoCore
      • 0x15d9b:$a: NanoCore
      • 0x163b4:$a: NanoCore
      • 0x164fd:$a: NanoCore
      • 0x169d1:$a: NanoCore
      • 0x16cb8:$a: NanoCore
      • 0x16ccf:$a: NanoCore
      • 0x1fb7f:$a: NanoCore
      • 0x1fbfb:$a: NanoCore
      • 0x224de:$a: NanoCore
      • 0x27ab5:$a: NanoCore
      • 0x27b2f:$a: NanoCore
      • 0x2da98:$a: NanoCore
      • 0x2dae2:$a: NanoCore
      • 0x2e73c:$a: NanoCore
      8.2.RFQ 10 UNIT.exe.456f7c1.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x2dbb:$x1: NanoCore.ClientPluginHost
      • 0x2de5:$x2: IClientNetworkHost
      Click to see the 69 entries

      Sigma Overview

      AV Detection:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\RFQ 10 UNIT.exe, ProcessId: 1540, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 19%
      Multi AV Scanner detection for submitted fileShow sources
      Source: RFQ 10 UNIT.exeReversingLabs: Detection: 19%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY
      Machine Learning detection for dropped fileShow sources
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: RFQ 10 UNIT.exeJoe Sandbox ML: detected
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpackAvira: Label: TR/NanoCore.fadte
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 24.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: RFQ 10 UNIT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: RFQ 10 UNIT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: dedicatedlambo9.ddns.net
      Source: Malware configuration extractorURLs: 185.140.53.253
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: dedicatedlambo9.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49725 -> 185.140.53.253:1604
      Source: global trafficTCP traffic: 192.168.2.3:49729 -> 84.38.133.182:1604
      Source: Joe Sandbox ViewIP Address: 185.140.53.253 185.140.53.253
      Source: Joe Sandbox ViewASN Name: DATACLUB-NL DATACLUB-NL
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
      Source: unknownDNS traffic detected: queries for: dedicatedlambo9.ddns.net
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: http://google.com
      Source: RFQ 10 UNIT.exe, 00000000.00000003.215074208.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc(
      Source: RFQ 10 UNIT.exe, 00000000.00000003.214967601.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comcJ
      Source: RFQ 10 UNIT.exe, 00000000.00000003.214937293.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comic
      Source: RFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmp, RFQ 10 UNIT.exe, 00000000.00000003.217178822.00000000058EC000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: RFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnayov
      Source: RFQ 10 UNIT.exe, 00000000.00000003.215153399.00000000058FB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comA
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 24.2.dhcpmon.exe.3189684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.4590022.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.485635523.0000000004706000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeCode function: 8_2_031EE471
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeCode function: 8_2_031EE480
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeCode function: 8_2_031EBBD4
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0309E471
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0309E480
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0309BBD4
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565F5F8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_05659788
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565A610
      Source: RFQ 10 UNIT.exe, 00000000.00000000.209499426.00000000004A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeBinary or memory string: OriginalFilename vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000007.00000000.269384397.0000000000372000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeBinary or memory string: OriginalFilename vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.476275048.0000000000E72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.479103223.000000000162A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeBinary or memory string: OriginalFilenameSignatureHelp.exeB vs RFQ 10 UNIT.exe
      Source: RFQ 10 UNIT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3466204.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.456f7c1.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 24.2.dhcpmon.exe.3189684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 24.2.dhcpmon.exe.3189684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.3459fbc.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47629df.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.4779c3e.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.476b80e.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.4590022.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.457b9f5.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 8.2.RFQ 10 UNIT.exe.342dfbc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.485635523.0000000004706000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: RFQ 10 UNIT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.8.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@12/2
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ 10 UNIT.exe.logJump to behavior
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c9622013-90b3-4810-9b2a-2fbba1723547}
      Source: RFQ 10 UNIT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: RFQ 10 UNIT.exeReversingLabs: Detection: 19%
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile read: C:\Users\user\Desktop\RFQ 10 UNIT.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe 'C:\Users\user\Desktop\RFQ 10 UNIT.exe'
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: RFQ 10 UNIT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: RFQ 10 UNIT.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: RFQ 10 UNIT.exeStatic file information: File size 1098240 > 1048576
      Source: RFQ 10 UNIT.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10ba00
      Source: RFQ 10 UNIT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: RFQ 10 UNIT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: RFQ 10 UNIT.exeStatic PE information: 0xBA9DB0CD [Tue Mar 19 05:29:49 2069 UTC]
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_0565B5E0 push eax; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 24_2_056569F8 pushad ; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.62768729612
      Source: initial sampleStatic PE information: section name: .text entropy: 7.62768729612
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeFile opened: C:\Users\user\Desktop\RFQ 10 UNIT.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: threadDelayed 2059
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: threadDelayed 7456
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: foregroundWindowGot 532
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWindow / User API: foregroundWindowGot 605
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exe TID: 4472Thread sleep time: -48714s >= -30000s
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exe TID: 1488Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exe TID: 3396Thread sleep time: -13835058055282155s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2648Thread sleep time: -53647s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1784Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2116Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 48714
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 53647
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: RFQ 10 UNIT.exe, dhcpmon.exeBinary or memory string: zE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ]tM5W|Y5fY<YeDL[]nopgyMKX3QZ]tM5WzE[Ti4JD|YJ]s]6e|EIgmYpdl<nfoU[gz45eG<YeDPZeV]WerYHWsYZfGgmTWg4U3EzTqEqVWooe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.479715222.00000000016E0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?6N
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeMemory written: C:\Users\user\Desktop\RFQ 10 UNIT.exe base: 400000 value starts with: 4D5A
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeProcess created: C:\Users\user\Desktop\RFQ 10 UNIT.exe C:\Users\user\Desktop\RFQ 10 UNIT.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: RFQ 10 UNIT.exe, 00000008.00000002.480215738.0000000001C80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: RFQ 10 UNIT.exe, 00000008.00000002.483664645.0000000003711000.00000004.00000001.sdmpBinary or memory string: Program Manager0+
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Users\user\Desktop\RFQ 10 UNIT.exe VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Users\user\Desktop\RFQ 10 UNIT.exe VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\RFQ 10 UNIT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Source: RFQ 10 UNIT.exe, 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dhcpmon.exe, 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000018.00000002.402407981.0000000003121000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416b136.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.4174595.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.4438a40.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 24.2.dhcpmon.exe.416ff6c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.443d069.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f6b08.13.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47f1cd2.14.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 8.2.RFQ 10 UNIT.exe.47fb131.15.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection112Masquerading2Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      RFQ 10 UNIT.exe20%ReversingLabsWin32.Trojan.AgentTesla
      RFQ 10 UNIT.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe20%ReversingLabsWin32.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      8.2.RFQ 10 UNIT.exe.4438a40.6.unpack100%AviraTR/NanoCore.fadteDownload File
      8.2.RFQ 10 UNIT.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      24.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      dedicatedlambo9.ddns.net0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.fonts.comic0%URL Reputationsafe
      http://www.fonts.comic0%URL Reputationsafe
      http://www.fonts.comic0%URL Reputationsafe
      http://www.founder.com.cn/cnayov0%Avira URL Cloudsafe
      http://www.fonts.comcJ0%Avira URL Cloudsafe
      185.140.53.2530%Avira URL Cloudsafe
      http://www.tiro.comA0%Avira URL Cloudsafe
      http://www.fonts.comc(0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      dedicatedlambo9.ddns.net
      84.38.133.182
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        dedicatedlambo9.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        185.140.53.253true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.founder.com.cn/cnRFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmp, RFQ 10 UNIT.exe, 00000000.00000003.217178822.00000000058EC000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.fonts.comicRFQ 10 UNIT.exe, 00000000.00000003.214937293.00000000058FB000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnayovRFQ 10 UNIT.exe, 00000000.00000003.216431606.00000000058F1000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://google.comRFQ 10 UNIT.exe, 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmpfalse
          high
          http://www.fonts.comcJRFQ 10 UNIT.exe, 00000000.00000003.214967601.00000000058FB000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tiro.comARFQ 10 UNIT.exe, 00000000.00000003.215153399.00000000058FB000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fonts.comc(RFQ 10 UNIT.exe, 00000000.00000003.215074208.00000000058FB000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          low

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          84.38.133.182
          dedicatedlambo9.ddns.netLatvia
          203557DATACLUB-NLtrue
          185.140.53.253
          unknownSweden
          209623DAVID_CRAIGGGtrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:451100
          Start date:20.07.2021
          Start time:08:30:30
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 11m 35s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:RFQ 10 UNIT.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:28
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@8/8@12/2
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 40.88.32.150, 52.147.198.201, 23.211.6.115, 168.61.161.212, 13.88.21.125, 52.255.188.83, 23.211.4.86, 20.82.210.154, 173.222.108.210, 173.222.108.226, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.49.157.6
          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolwus15.cloudapp.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/451100/sample/RFQ 10 UNIT.exe

          Simulations

          Behavior and APIs

          TimeTypeDescription
          08:31:49API Interceptor792x Sleep call for process: RFQ 10 UNIT.exe modified
          08:31:56AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          08:32:40API Interceptor1x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          185.140.53.253NEWORDERrefno0992883jpg.exeGet hashmaliciousBrowse
            CompanyLicense.exeGet hashmaliciousBrowse
              16Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                15Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                  58Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                    57Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                      15Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                        14Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                          57Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                            56Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              DAVID_CRAIGGGA2CGhuioKe.exeGet hashmaliciousBrowse
                              • 185.244.30.28
                              0kEuVjiCbh.exeGet hashmaliciousBrowse
                              • 185.244.30.28
                              RFQ_Order WT013 - A11197322,pdf.exeGet hashmaliciousBrowse
                              • 185.244.30.18
                              ORDER.exeGet hashmaliciousBrowse
                              • 185.140.53.132
                              DHL_119040 receipt document,pdf.exeGet hashmaliciousBrowse
                              • 185.244.30.18
                              Img 673t5718737.exeGet hashmaliciousBrowse
                              • 91.193.75.202
                              Parts_Enquiry_450kr6CRT.vbsGet hashmaliciousBrowse
                              • 185.140.53.169
                              ltemsreceipt975432907.exeGet hashmaliciousBrowse
                              • 185.244.30.19
                              H194 #U5146#U57fa - Payment.exeGet hashmaliciousBrowse
                              • 185.140.53.135
                              Parts-Enquiry_OYU08W0VCWRDLPA.vbsGet hashmaliciousBrowse
                              • 185.140.53.169
                              OneDrive.exeGet hashmaliciousBrowse
                              • 185.140.53.194
                              CVhssiltQ9.exeGet hashmaliciousBrowse
                              • 185.140.53.9
                              rz89FRwKvB.exeGet hashmaliciousBrowse
                              • 185.244.30.92
                              doc030WA0004-55YH701-75IMG0012.exeGet hashmaliciousBrowse
                              • 185.140.53.230
                              Request For Quotation.xlsxGet hashmaliciousBrowse
                              • 185.140.53.154
                              CV CREDENTIALS.exeGet hashmaliciousBrowse
                              • 185.140.53.8
                              ARRIVAL NOTICEPDF.EXCL.exeGet hashmaliciousBrowse
                              • 185.140.53.142
                              WeASwOPOdNuVKbq.exeGet hashmaliciousBrowse
                              • 185.140.53.8
                              New Order# 11009947810.exeGet hashmaliciousBrowse
                              • 185.140.53.216
                              vEJ2Mfxn6p.exeGet hashmaliciousBrowse
                              • 185.140.53.134
                              DATACLUB-NLFacebookSecurityUpdate.exeGet hashmaliciousBrowse
                              • 84.38.133.101
                              v1hBv6A71M.exeGet hashmaliciousBrowse
                              • 84.38.133.24
                              Standardequips_Quote.pptGet hashmaliciousBrowse
                              • 185.29.11.15
                              XsNgUDFxLw.exeGet hashmaliciousBrowse
                              • 84.38.133.117
                              18Order.exeGet hashmaliciousBrowse
                              • 185.29.11.103
                              56New Order oct 2018230090.exeGet hashmaliciousBrowse
                              • 185.29.11.103

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):1098240
                              Entropy (8bit):7.622687617903329
                              Encrypted:false
                              SSDEEP:24576:+bnQK7ECKrvDBI1/jUHsvoCzA+7ZAkwVileDd2A0iM3/4UF+voC:DBW1/aunlikidX0iM3/pmd
                              MD5:97904D814BCDA66EFE2D278EF92DA65F
                              SHA1:6CE40705C8DE4E3C8EFB1857DEB76357AC500DF7
                              SHA-256:D4A810DC5C1BF6CFCEDAF05D46A9230250CE314CC19082CA044763DCD9FF7135
                              SHA-512:ADB1CCA1A4ED550CE3B0339CB60ECDC22EFB2A7EA3315137CFA31934C73DCAC9E61308D9E964C6F187E55496439E0D26582E26ADCC519D6ABDEEF7DA1A9F8F4C
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 20%
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................P.................. ........@.. ....................... ............@.................................P...O...................................4................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........||..........l....<...........................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*&..(3....*...0..<........~.....(4.....,!r...p.....(5...o6...s7............~.....
                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: [ZoneTransfer]....ZoneId=0
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ 10 UNIT.exe.log
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1314
                              Entropy (8bit):5.350128552078965
                              Encrypted:false
                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1314
                              Entropy (8bit):5.350128552078965
                              Encrypted:false
                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1624
                              Entropy (8bit):7.024371743172393
                              Encrypted:false
                              SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC08
                              MD5:0D79388CEC6619D612C2088173BB6741
                              SHA1:8A312E3198009C545D0CF3254572189D29A03EA7
                              SHA-256:D7D423B23D932E306F3CCB2F7A984B7036A042C007A43FD655C6B57B960BB8DF
                              SHA-512:53BB3E9263DFD746E7E8159466E220E6EC9D81E9D3F0E1D191E09CD511B7EB93B0BA65D13CE0C97C652ECD0F69BB991E6B1840F961BC65003C4DD7AA93EEDA13
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:b+:S
                              MD5:2E61B957E818BFB06D029DFFAD9186CA
                              SHA1:D4950C122F3C8F85DECC2A8EAF4A7307F6E0EBB9
                              SHA-256:5686B94B5CE4C8B0D3A479A2856CE1AAFFAEF5B3A75901F45F530470031F1090
                              SHA-512:EE64E72026088B64B7BC7BFAF152D261E23A1F76EC9517B4C4103332AA3FBE836BFC110183F70F6412E6A5B8221EF56D4D0793FADCA4DC0DC00B4829EC36616D
                              Malicious:true
                              Preview: .....K.H
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:modified
                              Size (bytes):40
                              Entropy (8bit):5.153055907333276
                              Encrypted:false
                              SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                              MD5:4E5E92E2369688041CC82EF9650EDED2
                              SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                              SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                              SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                              Malicious:false
                              Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                              Process:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):327432
                              Entropy (8bit):7.99938831605763
                              Encrypted:true
                              SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                              MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                              SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                              SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                              SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                              Malicious:false
                              Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.622687617903329
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:RFQ 10 UNIT.exe
                              File size:1098240
                              MD5:97904d814bcda66efe2d278ef92da65f
                              SHA1:6ce40705c8de4e3c8efb1857deb76357ac500df7
                              SHA256:d4a810dc5c1bf6cfcedaf05d46a9230250ce314cc19082ca044763dcd9ff7135
                              SHA512:adb1cca1a4ed550ce3b0339cb60ecdc22efb2a7ea3315137cfa31934c73dcac9e61308d9e964c6f187e55496439e0d26582e26adcc519d6abdeef7da1a9f8f4c
                              SSDEEP:24576:+bnQK7ECKrvDBI1/jUHsvoCzA+7ZAkwVileDd2A0iM3/4UF+voC:DBW1/aunlikidX0iM3/pmd
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................... ............@................................

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x50d9a2
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0xBA9DB0CD [Tue Mar 19 05:29:49 2069 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x10d9500x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x10e0000x3a8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1100000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x10d9340x1c.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x10b9a80x10ba00False0.76949658454data7.62768729612IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x10e0000x3a80x400False0.3779296875data2.93439777021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1100000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x10e0580x34cdata

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2019
                              Assembly Version1.0.0.0
                              InternalNameSignatureHelp.exe
                              FileVersion1.0.0.0
                              CompanyName
                              LegalTrademarks
                              Comments
                              ProductNameControlVehicular
                              ProductVersion1.0.0.0
                              FileDescriptionControlVehicular
                              OriginalFilenameSignatureHelp.exe

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jul 20, 2021 08:31:53.965097904 CEST497251604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:54.017478943 CEST160449725185.140.53.253192.168.2.3
                              Jul 20, 2021 08:31:54.525213957 CEST497251604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:54.577574968 CEST160449725185.140.53.253192.168.2.3
                              Jul 20, 2021 08:31:55.091340065 CEST497251604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:55.143786907 CEST160449725185.140.53.253192.168.2.3
                              Jul 20, 2021 08:31:59.655571938 CEST497261604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:31:59.708025932 CEST160449726185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:00.213185072 CEST497261604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:00.271600962 CEST160449726185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:00.775748968 CEST497261604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:00.828226089 CEST160449726185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:04.840707064 CEST497271604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:04.894807100 CEST160449727185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:05.401160955 CEST497271604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:05.461515903 CEST160449727185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:05.963871002 CEST497271604192.168.2.3185.140.53.253
                              Jul 20, 2021 08:32:06.016484976 CEST160449727185.140.53.253192.168.2.3
                              Jul 20, 2021 08:32:10.304269075 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.353842020 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.353945971 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.393405914 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.460695982 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.469439983 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.479995966 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.530076027 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.530152082 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.600259066 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.600338936 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.671350002 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719286919 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719321012 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719338894 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719355106 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.719408035 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.719500065 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.768867970 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768899918 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768915892 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768932104 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768948078 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768963099 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768961906 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.768979073 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.768994093 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.768996954 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.769011021 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.769037962 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818128109 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818166018 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818180084 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818192005 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818207979 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818221092 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818238974 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818254948 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818276882 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818294048 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818296909 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818310022 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818327904 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818346024 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818361044 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818370104 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818376064 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818392992 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.818413019 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.818437099 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868072033 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868103981 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868119001 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868134975 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868150949 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868165970 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868181944 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868211985 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868216991 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868230104 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868247032 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868263960 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868271112 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868307114 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868321896 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868339062 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868355036 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868374109 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868393898 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868410110 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868418932 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868460894 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868486881 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868530989 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868546963 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868566036 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868576050 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868583918 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868608952 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868654966 CEST16044972984.38.133.182192.168.2.3
                              Jul 20, 2021 08:32:10.868701935 CEST497291604192.168.2.384.38.133.182
                              Jul 20, 2021 08:32:10.868702888 CEST16044972984.38.133.182192.168.2.3

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jul 20, 2021 08:31:13.677877903 CEST4919953192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:13.728728056 CEST53491998.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:15.092024088 CEST5062053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:15.154357910 CEST53506208.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:16.082168102 CEST6493853192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:16.145386934 CEST53649388.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:16.925029993 CEST6015253192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:16.979285002 CEST53601528.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:17.419193029 CEST5754453192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:17.479557991 CEST53575448.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:17.817135096 CEST5598453192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:17.872905970 CEST53559848.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:19.979044914 CEST6418553192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:20.029664040 CEST53641858.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:20.833656073 CEST6511053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:20.883372068 CEST53651108.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:26.054384947 CEST5836153192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:26.108437061 CEST53583618.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:27.717922926 CEST6349253192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:27.767272949 CEST53634928.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:28.817941904 CEST6083153192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:28.870630980 CEST53608318.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:30.779994011 CEST6010053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:30.842333078 CEST53601008.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:32.134699106 CEST5319553192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:32.195046902 CEST53531958.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:33.238751888 CEST5014153192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:33.290930033 CEST53501418.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:34.206728935 CEST5302353192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:34.258846998 CEST53530238.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:35.285579920 CEST4956353192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:35.339217901 CEST53495638.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:36.106810093 CEST5135253192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:36.160732985 CEST53513528.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:37.100457907 CEST5934953192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:37.149971962 CEST53593498.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:38.370778084 CEST5708453192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:38.420017958 CEST53570848.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:39.174007893 CEST5882353192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:39.231282949 CEST53588238.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:48.136630058 CEST5756853192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:48.199537992 CEST53575688.8.8.8192.168.2.3
                              Jul 20, 2021 08:31:51.481117010 CEST5054053192.168.2.38.8.8.8
                              Jul 20, 2021 08:31:51.554459095 CEST53505408.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:10.033478022 CEST5436653192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:10.093190908 CEST53543668.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:10.239372015 CEST5303453192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:10.301805019 CEST53530348.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:16.790425062 CEST5776253192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:16.850102901 CEST53577628.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:16.960113049 CEST5543553192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:17.026628017 CEST53554358.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:23.156908989 CEST5071353192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:23.218106031 CEST53507138.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:29.177911043 CEST5613253192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:29.238214970 CEST53561328.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:30.050033092 CEST5898753192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:30.106918097 CEST53589878.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:33.040863037 CEST5657953192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:33.099427938 CEST53565798.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:36.270360947 CEST6063353192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:36.328798056 CEST53606338.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:43.285545111 CEST6129253192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:43.346647978 CEST53612928.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:51.645318031 CEST6361953192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:51.704998970 CEST53636198.8.8.8192.168.2.3
                              Jul 20, 2021 08:32:57.678112984 CEST6493853192.168.2.38.8.8.8
                              Jul 20, 2021 08:32:57.735357046 CEST53649388.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:04.925019026 CEST6194653192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:04.985399008 CEST53619468.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:06.545713902 CEST6491053192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:06.612884045 CEST53649108.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:08.476099014 CEST5212353192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:08.551522970 CEST53521238.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:11.913871050 CEST5613053192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:11.963673115 CEST53561308.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:18.958626032 CEST5633853192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:19.011656046 CEST53563388.8.8.8192.168.2.3
                              Jul 20, 2021 08:33:25.125401020 CEST5942053192.168.2.38.8.8.8
                              Jul 20, 2021 08:33:25.185560942 CEST53594208.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Jul 20, 2021 08:32:10.239372015 CEST192.168.2.38.8.8.80xf5e8Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:16.790425062 CEST192.168.2.38.8.8.80xda52Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:23.156908989 CEST192.168.2.38.8.8.80x2592Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:30.050033092 CEST192.168.2.38.8.8.80xe404Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:36.270360947 CEST192.168.2.38.8.8.80x798aStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:43.285545111 CEST192.168.2.38.8.8.80xba51Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:51.645318031 CEST192.168.2.38.8.8.80xc6d4Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:57.678112984 CEST192.168.2.38.8.8.80x1088Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:04.925019026 CEST192.168.2.38.8.8.80xc933Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:11.913871050 CEST192.168.2.38.8.8.80x2465Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:18.958626032 CEST192.168.2.38.8.8.80x9d36Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:25.125401020 CEST192.168.2.38.8.8.80x7b7aStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Jul 20, 2021 08:32:10.301805019 CEST8.8.8.8192.168.2.30xf5e8No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:16.850102901 CEST8.8.8.8192.168.2.30xda52No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:23.218106031 CEST8.8.8.8192.168.2.30x2592No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:30.106918097 CEST8.8.8.8192.168.2.30xe404No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:36.328798056 CEST8.8.8.8192.168.2.30x798aNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:43.346647978 CEST8.8.8.8192.168.2.30xba51No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:51.704998970 CEST8.8.8.8192.168.2.30xc6d4No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:32:57.735357046 CEST8.8.8.8192.168.2.30x1088No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:04.985399008 CEST8.8.8.8192.168.2.30xc933No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:11.963673115 CEST8.8.8.8192.168.2.30x2465No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:19.011656046 CEST8.8.8.8192.168.2.30x9d36No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                              Jul 20, 2021 08:33:25.185560942 CEST8.8.8.8192.168.2.30x7b7aNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:08:31:22
                              Start date:20/07/2021
                              Path:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\RFQ 10 UNIT.exe'
                              Imagebase:0x4a0000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              General

                              Start time:08:31:50
                              Start date:20/07/2021
                              Path:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Imagebase:0x370000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:08:31:51
                              Start date:20/07/2021
                              Path:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\RFQ 10 UNIT.exe
                              Imagebase:0xe70000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.485058731.0000000004419000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.485186935.00000000044C0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.485635523.0000000004706000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.485779990.00000000047F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:08:32:05
                              Start date:20/07/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                              Imagebase:0x2e0000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 20%, ReversingLabs
                              Reputation:low

                              General

                              Start time:08:32:41
                              Start date:20/07/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Imagebase:0xc30000
                              File size:1098240 bytes
                              MD5 hash:97904D814BCDA66EFE2D278EF92DA65F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.401016722.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >