Loading ...

Play interactive tourEdit tour

Windows Analysis Report HUMVC_039873637892OIHGDHJZ.exe

Overview

General Information

Sample Name:HUMVC_039873637892OIHGDHJZ.exe
Analysis ID:451696
MD5:16d9ae1d9213807e9545f807cade8882
SHA1:4b51f85a5667469a312e56b467a6535604ac9a15
SHA256:faa8dd132b5dc23c12bb77efcba9373f9881096ea131b02671f1c59b8b065723
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Process Tree

  • System is w10x64
  • HUMVC_039873637892OIHGDHJZ.exe (PID: 2476 cmdline: 'C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe' MD5: 16D9AE1D9213807E9545F807CADE8882)
    • schtasks.exe (PID: 4744 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SyTPTBF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 5028 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
    • MSBuild.exe (PID: 1156 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
    • MSBuild.exe (PID: 5956 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
      • schtasks.exe (PID: 5924 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3DFC.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 4840 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp41B6.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 2588 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0 MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6136 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 6072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 3468 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "909dcd33-e0d7-4bd0-87b2-b7fd2611", "Group": "1116", "Domain1": "1116.hopto.org", "Domain2": "", "Port": 1116, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x35b5:$a: NanoCore
    • 0x360e:$a: NanoCore
    • 0x364b:$a: NanoCore
    • 0x36c4:$a: NanoCore
    • 0x16d6f:$a: NanoCore
    • 0x16d84:$a: NanoCore
    • 0x16db9:$a: NanoCore
    • 0x2fd53:$a: NanoCore
    • 0x2fd68:$a: NanoCore
    • 0x2fd9d:$a: NanoCore
    • 0x3617:$b: ClientPlugin
    • 0x3654:$b: ClientPlugin
    • 0x3f52:$b: ClientPlugin
    • 0x3f5f:$b: ClientPlugin
    • 0x16b2b:$b: ClientPlugin
    • 0x16b46:$b: ClientPlugin
    • 0x16b76:$b: ClientPlugin
    • 0x16d8d:$b: ClientPlugin
    • 0x16dc2:$b: ClientPlugin
    • 0x2fb0f:$b: ClientPlugin
    • 0x2fb2a:$b: ClientPlugin
    00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 6 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.MSBuild.exe.60c0000.10.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      5.2.MSBuild.exe.60c0000.10.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      5.2.MSBuild.exe.60c0000.10.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        5.2.MSBuild.exe.60c4629.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        5.2.MSBuild.exe.60c4629.9.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xb184:$x2: NanoCore.ClientPluginHost
        • 0xc25f:$s4: PipeCreated
        • 0xb19e:$s5: IClientLoggingHost
        Click to see the 25 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Possible Applocker BypassShow sources
        Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ParentCommandLine: 'C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe' , ParentImage: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe, ParentProcessId: 2476, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5028

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5956, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "909dcd33-e0d7-4bd0-87b2-b7fd2611", "Group": "1116", "Domain1": "1116.hopto.org", "Domain2": "", "Port": 1116, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: 1116.hopto.orgVirustotal: Detection: 6%Perma Link
        Source: 1116.hopto.orgVirustotal: Detection: 6%Perma Link
        Multi AV Scanner detection for submitted fileShow sources
        Source: HUMVC_039873637892OIHGDHJZ.exeVirustotal: Detection: 52%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.473461080.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\SyTPTBF.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: HUMVC_039873637892OIHGDHJZ.exeJoe Sandbox ML: detected
        Source: 5.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 5.2.MSBuild.exe.60c0000.10.unpackAvira: Label: TR/NanoCore.fadte
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.5.dr
        Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.dr

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: 1116.hopto.org
        Source: global trafficTCP traffic: 192.168.2.3:49701 -> 185.140.53.9:1116
        Source: Joe Sandbox ViewIP Address: 185.140.53.9 185.140.53.9
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.226
        Source: unknownTCP traffic detected without corresponding DNS query: 151.101.2.114
        Source: unknownTCP traffic detected without corresponding DNS query: 151.101.2.114
        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.226
        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.226
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownDNS traffic detected: queries for: 1116.hopto.org
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50257
        Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 50257 -> 443
        Source: MSBuild.exe, 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.473461080.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORY

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.52b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.2bea12c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.478438953.00000000052B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_0110E471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_0110E480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_0110BBD4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_06590040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00EF5CF9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00EF2148
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00EF4A20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00EF2133
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00EF1A40
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_01222148
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_01224580
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_01225858
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_01221A40
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_01222138
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_02482370
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_024818C0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 15_2_024851F9
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: SyTPTBF.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: HUMVC_039873637892OIHGDHJZ.exe, 00000000.00000000.202942274.0000000000234000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsByVal.exe* vs HUMVC_039873637892OIHGDHJZ.exe
        Source: HUMVC_039873637892OIHGDHJZ.exeBinary or memory string: OriginalFilenameIsByVal.exe* vs HUMVC_039873637892OIHGDHJZ.exe
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
        Source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.52b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.52b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.2bea12c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.2bea12c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000005.00000002.478438953.00000000052B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.478438953.00000000052B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: SyTPTBF.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: dhcpmon.exe.5.dr, Microsoft.Build/CommandLine/OutOfProcTaskHostNode.csTask registration methods: 'RegisterTaskObject', 'UnregisterPacketHandler', 'RegisterPacketHandler', 'UnregisterTaskObject', 'GetRegisteredTaskObject'
        Source: dhcpmon.exe.5.dr, Microsoft.Build/Shared/TaskLoader.csTask registration methods: 'CreateTask'
        Source: dhcpmon.exe.5.dr, Microsoft.Build/BackEnd/TaskParameter.csTask registration methods: 'CreateNewTaskItemFrom'
        Source: dhcpmon.exe.5.dr, Microsoft.Build/Shared/RegisteredTaskObjectCacheBase.csTask registration methods: '.cctor', 'GetLazyCollectionForLifetime', 'RegisterTaskObject', 'DisposeObjects', 'IsCollectionEmptyOrUncreated', '.ctor', 'UnregisterTaskObject', 'DisposeCacheObjects', 'GetRegisteredTaskObject', 'GetCollectionForLifetime'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 12.2.dhcpmon.exe.920000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.2.dhcpmon.exe.920000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: dhcpmon.exe.5.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: dhcpmon.exe.5.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
        Source: dhcpmon.exe.5.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
        Source: dhcpmon.exe.5.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: dhcpmon.exe.5.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 15.0.dhcpmon.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 15.0.dhcpmon.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
        Source: 15.0.dhcpmon.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
        Source: 12.0.dhcpmon.exe.920000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.0.dhcpmon.exe.920000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
        Source: 12.0.dhcpmon.exe.920000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
        Source: 12.0.dhcpmon.exe.920000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.0.dhcpmon.exe.920000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 12.2.dhcpmon.exe.920000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 12.2.dhcpmon.exe.920000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
        Source: 12.2.dhcpmon.exe.920000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
        Source: 15.0.dhcpmon.exe.120000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 15.0.dhcpmon.exe.120000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: dhcpmon.exe, 0000000F.00000002.268099517.0000000002581000.00000004.00000001.sdmpBinary or memory string: l)C:\Program Files (x86)\DHCP Monitor\*.sln
        Source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
        Source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
        Source: dhcpmon.exe, dhcpmon.exe.5.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
        Source: dhcpmon.exe, 0000000F.00000002.268099517.0000000002581000.00000004.00000001.sdmpBinary or memory string: *.slnP#
        Source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD
        Source: dhcpmon.exe, dhcpmon.exe.5.drBinary or memory string: *.sln
        Source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: MSBuild MyApp.csproj /t:Clean
        Source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: /ignoreprojectextensions:.sln
        Source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
        Source: classification engineClassification label: mal100.troj.evad.winEXE@22/14@12/1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeFile created: C:\Users\user\AppData\Roaming\SyTPTBF.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4424:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{909dcd33-e0d7-4bd0-87b2-b7fd2611b6b9}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4308:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3868:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4720:120:WilError_01
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMutant created: \Sessions\1\BaseNamedObjects\cIfVwHYARTkXHr
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5912:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6072:120:WilError_01
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB2F.tmpJump to behavior
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: HUMVC_039873637892OIHGDHJZ.exeVirustotal: Detection: 52%
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeFile read: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe 'C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe'
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SyTPTBF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2F.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3DFC.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp41B6.tmp'
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SyTPTBF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2F.tmp'
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3DFC.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp41B6.tmp'
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: HUMVC_039873637892OIHGDHJZ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.5.dr
        Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: dhcpmon.exe, 0000000C.00000000.255138652.0000000000922000.00000002.00020000.sdmp, dhcpmon.exe, 0000000F.00000000.264992405.0000000000122000.00000002.00020000.sdmp, dhcpmon.exe.5.dr

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: initial sampleStatic PE information: section name: .text entropy: 7.93103784286
        Source: initial sampleStatic PE information: section name: .text entropy: 7.93103784286
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeFile created: C:\Users\user\AppData\Roaming\SyTPTBF.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SyTPTBF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2F.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1717
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 7816
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 830
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe TID: 3008Thread sleep time: -49114s >= -30000s
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe TID: 1200Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1092Thread sleep time: -20291418481080494s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4168Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5352Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5872Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeThread delayed: delay time: 49114
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: MSBuild.exe, 00000005.00000002.479232158.0000000006960000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: MSBuild.exe, 00000005.00000002.479232158.0000000006960000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: MSBuild.exe, 00000005.00000002.479232158.0000000006960000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: MSBuild.exe, 00000005.00000002.479232158.0000000006960000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        .NET source code references suspicious native API functionsShow sources
        Source: dhcpmon.exe.5.dr, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjryTBW16mUfo_ItH9KWoGQu003du003d.csReference to suspicious API methods: ('#=qxG$Aklpbf6gyBfAqTMmORA==', 'OpenProcess@kernel32.dll'), ('#=qh7diH14jww3Fm9rMJ_jIfQ==', 'FindResourceEx@kernel32.dll')
        Source: 12.0.dhcpmon.exe.920000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
        Source: 12.2.dhcpmon.exe.920000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
        Source: 15.0.dhcpmon.exe.120000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 420000
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 422000
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 9AB008
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SyTPTBF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2F.tmp'
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3DFC.tmp'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp41B6.tmp'
        Source: MSBuild.exe, 00000005.00000002.475672739.0000000002F2C000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: MSBuild.exe, 00000005.00000002.472901472.00000000014B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: MSBuild.exe, 00000005.00000002.472901472.00000000014B0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: MSBuild.exe, 00000005.00000002.478687375.0000000005FAB000.00000004.00000001.sdmpBinary or memory string: Program Manager 4Lln
        Source: MSBuild.exe, 00000005.00000002.475672739.0000000002F2C000.00000004.00000001.sdmpBinary or memory string: Program Manager8
        Source: MSBuild.exe, 00000005.00000002.472901472.00000000014B0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
        Source: C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.473461080.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORY

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: MSBuild.exe, 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c4629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.60c0000.10.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c04c35.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3c0060c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3bfb7d6.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.473461080.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job11Scheduled Task/Job11Process Injection212Masquerading2Input Capture11Security Software Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsNative API1Boot or Logon Initialization ScriptsScheduled Task/Job11Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 451696 Sample: HUMVC_039873637892OIHGDHJZ.exe Startdate: 21/07/2021 Architecture: WINDOWS Score: 100 58 1116.hopto.org 2->58 62 Multi AV Scanner detection for domain / URL 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 9 other signatures 2->68 9 HUMVC_039873637892OIHGDHJZ.exe 7 2->9         started        13 dhcpmon.exe 4 2->13         started        15 dhcpmon.exe 3 2->15         started        17 MSBuild.exe 2 2->17         started        signatures3 process4 file5 50 C:\Users\user\AppData\Roaming\SyTPTBF.exe, PE32 9->50 dropped 52 C:\Users\user\...\SyTPTBF.exe:Zone.Identifier, ASCII 9->52 dropped 54 C:\Users\user\AppData\Local\Temp\tmpB2F.tmp, XML 9->54 dropped 56 C:\...\HUMVC_039873637892OIHGDHJZ.exe.log, ASCII 9->56 dropped 72 Uses schtasks.exe or at.exe to add and modify task schedules 9->72 74 Writes to foreign memory regions 9->74 76 Injects a PE file into a foreign processes 9->76 19 MSBuild.exe 1 11 9->19         started        24 schtasks.exe 1 9->24         started        26 MSBuild.exe 9->26         started        28 MSBuild.exe 9->28         started        30 conhost.exe 13->30         started        32 conhost.exe 15->32         started        34 conhost.exe 17->34         started        signatures6 process7 dnsIp8 60 1116.hopto.org 185.140.53.9, 1116, 49701, 49704 DAVID_CRAIGGG Sweden 19->60 46 C:\Users\user\AppData\Roaming\...\run.dat, data 19->46 dropped 48 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->48 dropped 70 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->70 36 schtasks.exe 1 19->36         started        38 schtasks.exe 1 19->38         started        40 conhost.exe 24->40         started        file9 signatures10 process11 process12 42 conhost.exe 36->42         started        44 conhost.exe 38->44         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        HUMVC_039873637892OIHGDHJZ.exe53%VirustotalBrowse
        HUMVC_039873637892OIHGDHJZ.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\SyTPTBF.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%VirustotalBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        5.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        5.2.MSBuild.exe.60c0000.10.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        1116.hopto.org7%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        1116.hopto.org7%VirustotalBrowse
        1116.hopto.org0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        1116.hopto.org
        185.140.53.9
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        1116.hopto.orgtrue
        • 7%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.140.53.9
        1116.hopto.orgSweden
        209623DAVID_CRAIGGGtrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:451696
        Start date:21.07.2021
        Start time:03:50:36
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 9m 34s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:HUMVC_039873637892OIHGDHJZ.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:26
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@22/14@12/1
        EGA Information:
        • Successful, ratio: 20%
        HDC Information:
        • Successful, ratio: 5.4% (good quality ratio 4.7%)
        • Quality average: 38.6%
        • Quality standard deviation: 20.2%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 52.147.198.201, 40.88.32.150, 23.211.4.86
        • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus15.cloudapp.net, fs.microsoft.com, blobcollector.events.data.trafficmanager.net, e1723.g.akamaiedge.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net
        • Execution Graph export aborted for target MSBuild.exe, PID 2588 because it is empty
        • Execution Graph export aborted for target dhcpmon.exe, PID 3468 because it is empty
        • Execution Graph export aborted for target dhcpmon.exe, PID 6136 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        03:51:39API Interceptor2x Sleep call for process: HUMVC_039873637892OIHGDHJZ.exe modified
        03:51:45AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        03:51:46Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" s>$(Arg0)
        03:51:46API Interceptor920x Sleep call for process: MSBuild.exe modified
        03:51:48Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.140.53.9CVhssiltQ9.exeGet hashmaliciousBrowse
          AWQ#U007e0007655678TH.exeGet hashmaliciousBrowse
            Ubn_03030387356383-tg.exeGet hashmaliciousBrowse
              Urgent RFQAP65425652032421,pdf.exeGet hashmaliciousBrowse
                PCT0002982765627827BC.exeGet hashmaliciousBrowse
                  nXa6P8N8MS.exeGet hashmaliciousBrowse
                    __RFQAP65425652032421_pdf.exeGet hashmaliciousBrowse
                      Urgence RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                        ANS_309487487_#049844874.exeGet hashmaliciousBrowse
                          t5R60D503x.exeGet hashmaliciousBrowse
                            GT_0397337_03987638BNG.exeGet hashmaliciousBrowse
                              1PH37n4Gva.exeGet hashmaliciousBrowse
                                malwa.exeGet hashmaliciousBrowse
                                  HDF_39837635_0398376HJD.exeGet hashmaliciousBrowse
                                    E0029876556_209876689.exeGet hashmaliciousBrowse
                                      BGD_03987365_0398736DSC.exeGet hashmaliciousBrowse
                                        DHL_AWB #9855452108.exeGet hashmaliciousBrowse
                                          Simo_Inquiry_FOB_Order_9820_xlsx.exeGet hashmaliciousBrowse
                                            Summer_richiesta_di_preventivo_070820.exeGet hashmaliciousBrowse
                                              RF172474228ES.exeGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                1116.hopto.orgAWQ#U007e0007655678TH.exeGet hashmaliciousBrowse
                                                • 185.140.53.9
                                                Ubn_03030387356383-tg.exeGet hashmaliciousBrowse
                                                • 185.140.53.9

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                DAVID_CRAIGGGSolicite ER4101317594762443T51,pdf.exeGet hashmaliciousBrowse
                                                • 185.140.53.11
                                                documentos de env#U00edo 20 de julio de 2021,pdf.e.exeGet hashmaliciousBrowse
                                                • 185.140.53.11
                                                ORDER TSA-A090621B.exeGet hashmaliciousBrowse
                                                • 185.140.53.253
                                                RFQ 10 UNIT.exeGet hashmaliciousBrowse
                                                • 185.140.53.253
                                                A2CGhuioKe.exeGet hashmaliciousBrowse
                                                • 185.244.30.28
                                                0kEuVjiCbh.exeGet hashmaliciousBrowse
                                                • 185.244.30.28
                                                RFQ_Order WT013 - A11197322,pdf.exeGet hashmaliciousBrowse
                                                • 185.244.30.18
                                                ORDER.exeGet hashmaliciousBrowse
                                                • 185.140.53.132
                                                DHL_119040 receipt document,pdf.exeGet hashmaliciousBrowse
                                                • 185.244.30.18
                                                Img 673t5718737.exeGet hashmaliciousBrowse
                                                • 91.193.75.202
                                                Parts_Enquiry_450kr6CRT.vbsGet hashmaliciousBrowse
                                                • 185.140.53.169
                                                ltemsreceipt975432907.exeGet hashmaliciousBrowse
                                                • 185.244.30.19
                                                H194 #U5146#U57fa - Payment.exeGet hashmaliciousBrowse
                                                • 185.140.53.135
                                                Parts-Enquiry_OYU08W0VCWRDLPA.vbsGet hashmaliciousBrowse
                                                • 185.140.53.169
                                                OneDrive.exeGet hashmaliciousBrowse
                                                • 185.140.53.194
                                                CVhssiltQ9.exeGet hashmaliciousBrowse
                                                • 185.140.53.9
                                                rz89FRwKvB.exeGet hashmaliciousBrowse
                                                • 185.244.30.92
                                                doc030WA0004-55YH701-75IMG0012.exeGet hashmaliciousBrowse
                                                • 185.140.53.230
                                                Request For Quotation.xlsxGet hashmaliciousBrowse
                                                • 185.140.53.154
                                                CV CREDENTIALS.exeGet hashmaliciousBrowse
                                                • 185.140.53.8

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeHSBC Swift.exeGet hashmaliciousBrowse
                                                  Purchase Order.exeGet hashmaliciousBrowse
                                                    Contract05072157393.exeGet hashmaliciousBrowse
                                                      19495C90691E8B6EEF5D55D50B9D76AE6CEB5629D6C08.exeGet hashmaliciousBrowse
                                                        PO# 6042089404900 & PAYMENT DETAILSpdf.exeGet hashmaliciousBrowse
                                                          SOA.exeGet hashmaliciousBrowse
                                                            Quotation Price - Double R Trading b.v.exeGet hashmaliciousBrowse
                                                              QTN TECHN 80654.exeGet hashmaliciousBrowse
                                                                Nizi International S.A. #New Order.exeGet hashmaliciousBrowse
                                                                  DHL Shipment Documents.exeGet hashmaliciousBrowse
                                                                    27bd034c36964c455e2b2ad6b264561f.exeGet hashmaliciousBrowse
                                                                      quote #2063 almaco.exeGet hashmaliciousBrowse
                                                                        ConsoleSniffer v4.1 installer.exeGet hashmaliciousBrowse
                                                                          jtH33Uljkz.exeGet hashmaliciousBrowse
                                                                            quote #60123.exeGet hashmaliciousBrowse
                                                                              4Ln2OMmPj79MMLB.exeGet hashmaliciousBrowse
                                                                                EaQJs1GILVylIiG.exeGet hashmaliciousBrowse
                                                                                  Quote-TSL-1037174_4810.exeGet hashmaliciousBrowse
                                                                                    Quotation HT210525 IV.exeGet hashmaliciousBrowse
                                                                                      xtxr8lHa5F.exeGet hashmaliciousBrowse

                                                                                        Created / dropped Files

                                                                                        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):261728
                                                                                        Entropy (8bit):6.1750840449797675
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:Mao0QHGUQWWimj9q/NLpj/WWqvAw2XpFU4rwOe4ubZSif02RFi/x2uv9FeP:boZTTWxxqVpqWVRXfr802biprVu
                                                                                        MD5:D621FD77BD585874F9686D3A76462EF1
                                                                                        SHA1:ABCAE05EE61EE6292003AABD8C80583FA49EDDA2
                                                                                        SHA-256:2CA7CF7146FB8209CF3C6CECB1C5AA154C61E046DC07AFA05E8158F2C0DDE2F6
                                                                                        SHA-512:2D85A81D708ECC8AF9A1273143C94DA84E632F1E595E22F54B867225105A1D0A44F918F0FAE6F1EB15ECF69D75B6F4616699776A16A2AA8B5282100FD15CA74C
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: HSBC Swift.exe, Detection: malicious, Browse
                                                                                        • Filename: Purchase Order.exe, Detection: malicious, Browse
                                                                                        • Filename: Contract05072157393.exe, Detection: malicious, Browse
                                                                                        • Filename: 19495C90691E8B6EEF5D55D50B9D76AE6CEB5629D6C08.exe, Detection: malicious, Browse
                                                                                        • Filename: PO# 6042089404900 & PAYMENT DETAILSpdf.exe, Detection: malicious, Browse
                                                                                        • Filename: SOA.exe, Detection: malicious, Browse
                                                                                        • Filename: Quotation Price - Double R Trading b.v.exe, Detection: malicious, Browse
                                                                                        • Filename: QTN TECHN 80654.exe, Detection: malicious, Browse
                                                                                        • Filename: Nizi International S.A. #New Order.exe, Detection: malicious, Browse
                                                                                        • Filename: DHL Shipment Documents.exe, Detection: malicious, Browse
                                                                                        • Filename: 27bd034c36964c455e2b2ad6b264561f.exe, Detection: malicious, Browse
                                                                                        • Filename: quote #2063 almaco.exe, Detection: malicious, Browse
                                                                                        • Filename: ConsoleSniffer v4.1 installer.exe, Detection: malicious, Browse
                                                                                        • Filename: jtH33Uljkz.exe, Detection: malicious, Browse
                                                                                        • Filename: quote #60123.exe, Detection: malicious, Browse
                                                                                        • Filename: 4Ln2OMmPj79MMLB.exe, Detection: malicious, Browse
                                                                                        • Filename: EaQJs1GILVylIiG.exe, Detection: malicious, Browse
                                                                                        • Filename: Quote-TSL-1037174_4810.exe, Detection: malicious, Browse
                                                                                        • Filename: Quotation HT210525 IV.exe, Detection: malicious, Browse
                                                                                        • Filename: xtxr8lHa5F.exe, Detection: malicious, Browse
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z.........."...0..|...B......n.... ........@.. ....................................`.....................................O........>..............`>.......................................................... ............... ..H............text....z... ...|.................. ..`.rsrc....>.......@...~..............@..@.reloc..............................@..B................P.......H.......8)...................|.........................................*.{.......*v.(=....r...p({...-..+..}....*....0..%........(....-..*....(z.....&..}.........*.*....................0..5........(....-..*.-.r+..ps>...z.....i(z.....&..}.........*.*............%......>....(?...(....*N..(@....oA...(....*:...(B...(....*:...(C...(....**....(....*....0..G........(....,..*..(....-...}.....*.r...p(x...&.(v.....}......&..}.........*.*..........7.......0..f........-.r7..ps>...z .....
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HUMVC_039873637892OIHGDHJZ.exe.log
                                                                                        Process:C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):1216
                                                                                        Entropy (8bit):5.355304211458859
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                        MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                        SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                        SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                        SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                        Malicious:true
                                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):841
                                                                                        Entropy (8bit):5.356220854328477
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoIvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHwvEHxDqHj
                                                                                        MD5:486580834B084C92AE1F3866166C9C34
                                                                                        SHA1:C8EB7E1CEF55A6C9EB931487E9AA4A2098AACEDF
                                                                                        SHA-256:65C5B1213E371D449E2A239557A5F250FEA1D3473A1B5C4C5FF7492085F663FB
                                                                                        SHA-512:2C54B638A52AA87F47CAB50859EFF98F07DA02993A596686B5617BA99E73ABFCD104F0F33209E24AFB32E66B4B8A225D4DB2CC79631540C21E7E8C4573DFD457
                                                                                        Malicious:false
                                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):1037
                                                                                        Entropy (8bit):5.371216502395632
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7KvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHhAHKzvKvEHxD0
                                                                                        MD5:C7F28B87C2CAD111D929CB9A0FF822F8
                                                                                        SHA1:C2CF9E7A3F6EFD9000FE76EBE54E4E9AE5754267
                                                                                        SHA-256:D1B02C20EACF464229AB063FA947A525E2ED7772259A8F70C7205DC13599EAE6
                                                                                        SHA-512:E0F35874E02AB672CFF0553A0DA0864DAB14C05733D06395E4D0C9CDFC6F445E940310F8D01E3E1B28895F636DFBC1F510E103D1C46818400BA4E7371D8F254D
                                                                                        Malicious:false
                                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral,
                                                                                        C:\Users\user\AppData\Local\Temp\tmp3DFC.tmp
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1320
                                                                                        Entropy (8bit):5.137611098420233
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0moxtn:cbk4oL600QydbQxIYODOLedq3Zoj
                                                                                        MD5:3E2B26ED8B75AE83A269595180E84EF6
                                                                                        SHA1:D30A0335FCCE406BCA8BA5764288235E6192F608
                                                                                        SHA-256:108BE30AEB8EB31C185A39A6726F26DACBC4E4124951C61A29ADE4B7038C71EA
                                                                                        SHA-512:B6981C68FCB886CC8379A068B96931B9D4F5CC5AA9BDC467E36C4168FE6C5273A2A84D8850B12C11703EC03AC6B1F1950D1E669EFCB59FC2402CE4BBA9DC03D3
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                        C:\Users\user\AppData\Local\Temp\tmp41B6.tmp
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1310
                                                                                        Entropy (8bit):5.109425792877704
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                        MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                        SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                        SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                        SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                        C:\Users\user\AppData\Local\Temp\tmpB2F.tmp
                                                                                        Process:C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1640
                                                                                        Entropy (8bit):5.187159770137202
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKByOtn:cbh47TlNQ//rydbz9I3YODOLNdq3wo
                                                                                        MD5:33A5B9A10C2EB765DBFD095B9F34244D
                                                                                        SHA1:65BAF3766C049F7F4D2525867E74E5D490C8CC6F
                                                                                        SHA-256:26F4B80815BE68CDA7C47F99C89E52D509533D0648D1E95C4823BE841AF2E8E4
                                                                                        SHA-512:35DDF8D89AF209C72E6DD13C00F16A50E7B6B2E9F6C761BF6E7E552F571DC9FC1AB1D23875F8B4D309ED536DBBC9E64E352D593F333CB0ABC58AD5DFCE1FA76E
                                                                                        Malicious:true
                                                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):8
                                                                                        Entropy (8bit):3.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:sSn:sSn
                                                                                        MD5:7C7EF8E06D5642E2974421A5732A770B
                                                                                        SHA1:3D567AB4CFE7FDAECF98CFF1A1BF2227982D917B
                                                                                        SHA-256:923F6E34A9D3EE3B3844B8D40A589E4A9CDEE904ACEB887407F91EAF6AAA2728
                                                                                        SHA-512:AC83D3944B28EA2F7EC8DD6EF1B3E8DB9C201C63752F550F5D55BDEC731432A1F4DC2F91C492EB28476595C62174D3A647F6698C7FAA6117A77EDEE1455956BE
                                                                                        Malicious:true
                                                                                        Preview: ....5L.H
                                                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):57
                                                                                        Entropy (8bit):4.887726803973036
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:oMty8WddSJ8:oMLW6C
                                                                                        MD5:6ECAFC0490DAB08E4A288E0042B6B613
                                                                                        SHA1:4A4529907588505FC65CC9933980CFE6E576B3D6
                                                                                        SHA-256:DC5F76FBF44B3E6CDDC14EA9E5BB9B6BD3A955197FE13F33F7DDA7ECC08E79E0
                                                                                        SHA-512:7DA2B02627A36C8199814C250A1FBD61A9C18E098F8D691C11D75044E7F51DBD52C31EC2E1EA8CDEE5077ADCCB8CD247266F191292DB661FE7EA1B613FC646F8
                                                                                        Malicious:false
                                                                                        Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        C:\Users\user\AppData\Roaming\SyTPTBF.exe
                                                                                        Process:C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):820224
                                                                                        Entropy (8bit):7.6081081994974
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:zp7n+TYEvTLv199MK8UKookUSWc4sZX80h5KxhKOUTBWJGpcc3:Bn+vHVMNBkUSugM6ihZuGGx3
                                                                                        MD5:16D9AE1D9213807E9545F807CADE8882
                                                                                        SHA1:4B51F85A5667469A312E56B467A6535604AC9A15
                                                                                        SHA-256:FAA8DD132B5DC23C12BB77EFCBA9373F9881096EA131B02671F1C59B8B065723
                                                                                        SHA-512:D5BA8E4F9BC4553CA80842E433EC1CD387E6F71B344C6568C77B952AA55850CE438AB2F56B7C981BBF572472A939E978E44366EBD4AD1C2F918F1855F48B2549
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.`............................*.... ... ....@.. ....................................@.....................................W....@..,.................... ....................................................... ............... ..H............text...0.... ...................... ..`.reloc....... ......................@..B.rsrc...,....@......................@..@........................H.......<....h......K.......|...........................................z.(......}.....(....o ...}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s!...z.2.{.....[...*....0..<........{......3..{....(....o ...3...}......+..s.......{....}..
                                                                                        C:\Users\user\AppData\Roaming\SyTPTBF.exe:Zone.Identifier
                                                                                        Process:C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):26
                                                                                        Entropy (8bit):3.95006375643621
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:ggPYV:rPYV
                                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                        Malicious:true
                                                                                        Preview: [ZoneTransfer]....ZoneId=0
                                                                                        \Device\ConDrv
                                                                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):298
                                                                                        Entropy (8bit):4.943030742860529
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:zx3M1tFAbQtU1R30qyMstwYVoRRZBXVN+J0fFdCsq2UTiMdH8stCal+n:zK13I30ZMt9BFN+QdCT2UftCM+
                                                                                        MD5:6A9888952541A41F033EB114C24DC902
                                                                                        SHA1:41903D7C8F31013C44572E09D97B9AAFBBCE77E6
                                                                                        SHA-256:41A61D0084CD7884BEA1DF02ED9213CB8C83F4034F5C8156FC5B06D6A3E133CE
                                                                                        SHA-512:E6AC898E67B4052375FDDFE9894B26D504A7827917BF3E02772CFF45C3FA7CC5E0EFFDC701D208E0DB89F05E42F195B1EC890F316BEE5CB8239AB45444DAA65E
                                                                                        Malicious:false
                                                                                        Preview: Microsoft (R) Build Engine version 4.7.3056.0..[Microsoft .NET Framework, version 4.0.30319.42000]..Copyright (C) Microsoft Corporation. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                                        Static File Info

                                                                                        General

                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.6081081994974
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        File name:HUMVC_039873637892OIHGDHJZ.exe
                                                                                        File size:820224
                                                                                        MD5:16d9ae1d9213807e9545f807cade8882
                                                                                        SHA1:4b51f85a5667469a312e56b467a6535604ac9a15
                                                                                        SHA256:faa8dd132b5dc23c12bb77efcba9373f9881096ea131b02671f1c59b8b065723
                                                                                        SHA512:d5ba8e4f9bc4553ca80842e433ec1cd387e6f71b344c6568c77b952aa55850ce438ab2f56b7c981bbf572472a939e978e44366ebd4ad1c2f918f1855f48b2549
                                                                                        SSDEEP:12288:zp7n+TYEvTLv199MK8UKookUSWc4sZX80h5KxhKOUTBWJGpcc3:Bn+vHVMNBkUSugM6ihZuGGx3
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.`............................*.... ... ....@.. ....................................@................................

                                                                                        File Icon

                                                                                        Icon Hash:74e4d4d4d4d4d4d4

                                                                                        Static PE Info

                                                                                        General

                                                                                        Entrypoint:0x4a1d2a
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                        Time Stamp:0x60F14FC2 [Fri Jul 16 09:22:10 2021 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:v4.0.30319
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                        Entrypoint Preview

                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al

                                                                                        Data Directories

                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa1cd00x57.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x2802c.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa20000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                        Sections

                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000x9fd300x9fe00False0.942586676603data7.93103784286IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                        .reloc0xa20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xa40000x2802c0x28200False0.0990496008567data4.85373961661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                        Resources

                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_ICON0xa42800x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                                                        RT_ICON0xb4aa80x94a8data
                                                                                        RT_ICON0xbdf500x5488data
                                                                                        RT_ICON0xc33d80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 255, next used block 4294905600
                                                                                        RT_ICON0xc76000x25a8data
                                                                                        RT_ICON0xc9ba80x10a8data
                                                                                        RT_ICON0xcac500x988data
                                                                                        RT_ICON0xcb5d80x468GLS_BINARY_LSB_FIRST
                                                                                        RT_GROUP_ICON0xcba400x76data
                                                                                        RT_VERSION0xcbab80x3c0data
                                                                                        RT_MANIFEST0xcbe780x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                                                                        Imports

                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain

                                                                                        Version Infos

                                                                                        DescriptionData
                                                                                        Translation0x0000 0x04b0
                                                                                        LegalCopyrightCopyright Computer/Spiele-Info.net 2013
                                                                                        Assembly Version1.0.1.0
                                                                                        InternalNameIsByVal.exe
                                                                                        FileVersion1.3.1.0
                                                                                        CompanyNameComputer/Spiele-Info.net
                                                                                        LegalTrademarksComputer/Spiele-Info.net
                                                                                        Comments2D-GameEngine by 3r0rXx
                                                                                        ProductNameVMML
                                                                                        ProductVersion1.3.1.0
                                                                                        FileDescriptionVMML
                                                                                        OriginalFilenameIsByVal.exe

                                                                                        Network Behavior

                                                                                        Network Port Distribution

                                                                                        TCP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jul 21, 2021 03:51:19.233501911 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.234373093 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.271106958 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.271143913 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.271151066 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.271322012 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.271373987 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.271395922 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.271469116 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.271497011 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.308978081 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309020996 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309041977 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309060097 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309111118 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309143066 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309169054 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309254885 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309262991 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.309293985 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309335947 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.309372902 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.309400082 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.309417009 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.309422016 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346513033 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346568108 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346584082 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346606970 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346630096 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346652985 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346674919 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346689939 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346714020 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346827984 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:19.346841097 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.346874952 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.398603916 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:19.398838997 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205092907 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205236912 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205301046 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205355883 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205410004 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205445051 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205473900 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205502987 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205524921 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.205543995 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.242403984 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.242537975 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.242563009 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.244882107 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.244908094 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245271921 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245301962 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245328903 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245345116 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245372057 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245388031 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245421886 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245452881 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245477915 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245502949 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245527983 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.245551109 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246146917 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246176004 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246195078 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246221066 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246237993 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246263981 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246289968 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246315002 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246443033 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.246579885 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246623039 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246649027 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246675014 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246700048 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.246831894 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:24.300967932 CEST44349682204.79.197.200192.168.2.3
                                                                                        Jul 21, 2021 03:51:24.301260948 CEST49682443192.168.2.3204.79.197.200
                                                                                        Jul 21, 2021 03:51:34.450155020 CEST4967880192.168.2.3173.222.108.226
                                                                                        Jul 21, 2021 03:51:36.473674059 CEST44350257151.101.2.114192.168.2.3
                                                                                        Jul 21, 2021 03:51:36.473741055 CEST44350257151.101.2.114192.168.2.3
                                                                                        Jul 21, 2021 03:51:36.473773956 CEST50257443192.168.2.3151.101.2.114
                                                                                        Jul 21, 2021 03:51:36.473887920 CEST50257443192.168.2.3151.101.2.114
                                                                                        Jul 21, 2021 03:51:48.322818041 CEST497011116192.168.2.3185.140.53.9
                                                                                        Jul 21, 2021 03:51:48.375850916 CEST111649701185.140.53.9192.168.2.3
                                                                                        Jul 21, 2021 03:51:48.886310101 CEST497011116192.168.2.3185.140.53.9
                                                                                        Jul 21, 2021 03:51:48.942424059 CEST111649701185.140.53.9192.168.2.3
                                                                                        Jul 21, 2021 03:51:49.448796988 CEST497011116192.168.2.3185.140.53.9
                                                                                        Jul 21, 2021 03:51:49.501940012 CEST111649701185.140.53.9192.168.2.3
                                                                                        Jul 21, 2021 03:51:53.702678919 CEST497041116192.168.2.3185.140.53.9
                                                                                        Jul 21, 2021 03:51:53.756314039 CEST111649704185.140.53.9192.168.2.3
                                                                                        Jul 21, 2021 03:51:54.260554075 CEST497041116192.168.2.3185.140.53.9
                                                                                        Jul 21, 2021 03:51:54.314256907 CEST111649704185.140.53.9192.168.2.3
                                                                                        Jul 21, 2021 03:51:54.823026896 CEST497041116192.168.2.3185.140.53.9
                                                                                        Jul 21, 2021 03:51:54.878806114 CEST111649704185.140.53.9192.168.2.3

                                                                                        UDP Packets

                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jul 21, 2021 03:51:18.202467918 CEST5935353192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:18.252687931 CEST53593538.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:20.022797108 CEST5223853192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:20.080991030 CEST53522388.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:20.802751064 CEST4987353192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:20.863364935 CEST53498738.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:21.724936008 CEST5319653192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:21.775227070 CEST53531968.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:22.665776014 CEST5677753192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:22.726191044 CEST53567778.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:23.819473982 CEST5864353192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:23.877937078 CEST53586438.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:25.130240917 CEST6098553192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:25.182157040 CEST53609858.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:26.220266104 CEST5020053192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:26.270309925 CEST53502008.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:27.064694881 CEST5128153192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:27.114361048 CEST53512818.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:28.961289883 CEST4919953192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:29.019694090 CEST53491998.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:30.281435966 CEST5062053192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:30.336317062 CEST53506208.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:31.129154921 CEST6493853192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:31.189815998 CEST53649388.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:32.000730038 CEST6015253192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:32.073991060 CEST53601528.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:32.818979025 CEST5754453192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:32.879477024 CEST53575448.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:33.637486935 CEST5598453192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:33.704668045 CEST53559848.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:48.239238024 CEST6418553192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:48.298796892 CEST53641858.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:53.640549898 CEST6511053192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:53.699945927 CEST53651108.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:53.943465948 CEST5836153192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:54.048023939 CEST53583618.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:51:59.157094955 CEST6349253192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:51:59.217750072 CEST53634928.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:52:20.173218966 CEST6083153192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:52:20.233788967 CEST53608318.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:52:25.452625036 CEST6010053192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:52:25.510504961 CEST53601008.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:52:30.749924898 CEST5319553192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:52:30.810293913 CEST53531958.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:52:51.693329096 CEST5014153192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:52:51.755877018 CEST53501418.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:52:56.970959902 CEST5302353192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:52:57.030994892 CEST53530238.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:53:02.248502970 CEST4956353192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:53:02.307182074 CEST53495638.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:53:23.105551958 CEST5135253192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:53:23.164592981 CEST53513528.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:53:28.386666059 CEST5934953192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:53:28.436691999 CEST53593498.8.8.8192.168.2.3
                                                                                        Jul 21, 2021 03:53:33.629120111 CEST5708453192.168.2.38.8.8.8
                                                                                        Jul 21, 2021 03:53:33.689150095 CEST53570848.8.8.8192.168.2.3

                                                                                        DNS Queries

                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                        Jul 21, 2021 03:51:48.239238024 CEST192.168.2.38.8.8.80xff05Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:51:53.640549898 CEST192.168.2.38.8.8.80x8ed1Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:51:59.157094955 CEST192.168.2.38.8.8.80xc543Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:20.173218966 CEST192.168.2.38.8.8.80xe928Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:25.452625036 CEST192.168.2.38.8.8.80xd90dStandard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:30.749924898 CEST192.168.2.38.8.8.80xf384Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:51.693329096 CEST192.168.2.38.8.8.80xf4a2Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:56.970959902 CEST192.168.2.38.8.8.80x8c38Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:02.248502970 CEST192.168.2.38.8.8.80x2a18Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:23.105551958 CEST192.168.2.38.8.8.80x786dStandard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:28.386666059 CEST192.168.2.38.8.8.80x9ec2Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:33.629120111 CEST192.168.2.38.8.8.80xd762Standard query (0)1116.hopto.orgA (IP address)IN (0x0001)

                                                                                        DNS Answers

                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                        Jul 21, 2021 03:51:48.298796892 CEST8.8.8.8192.168.2.30xff05No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:51:53.699945927 CEST8.8.8.8192.168.2.30x8ed1No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:51:59.217750072 CEST8.8.8.8192.168.2.30xc543No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:20.233788967 CEST8.8.8.8192.168.2.30xe928No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:25.510504961 CEST8.8.8.8192.168.2.30xd90dNo error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:30.810293913 CEST8.8.8.8192.168.2.30xf384No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:51.755877018 CEST8.8.8.8192.168.2.30xf4a2No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:52:57.030994892 CEST8.8.8.8192.168.2.30x8c38No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:02.307182074 CEST8.8.8.8192.168.2.30x2a18No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:23.164592981 CEST8.8.8.8192.168.2.30x786dNo error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:28.436691999 CEST8.8.8.8192.168.2.30x9ec2No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)
                                                                                        Jul 21, 2021 03:53:33.689150095 CEST8.8.8.8192.168.2.30xd762No error (0)1116.hopto.org185.140.53.9A (IP address)IN (0x0001)

                                                                                        Code Manipulations

                                                                                        Statistics

                                                                                        Behavior

                                                                                        Click to jump to process

                                                                                        System Behavior

                                                                                        General

                                                                                        Start time:03:51:24
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:'C:\Users\user\Desktop\HUMVC_039873637892OIHGDHJZ.exe'
                                                                                        Imagebase:0x190000
                                                                                        File size:820224 bytes
                                                                                        MD5 hash:16D9AE1D9213807E9545F807CADE8882
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Reputation:low

                                                                                        General

                                                                                        Start time:03:51:42
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\SyTPTBF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB2F.tmp'
                                                                                        Imagebase:0x140000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:42
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6b2800000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:43
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Imagebase:0x40000
                                                                                        File size:261728 bytes
                                                                                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:03:51:43
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Imagebase:0x1b0000
                                                                                        File size:261728 bytes
                                                                                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:03:51:43
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Imagebase:0x730000
                                                                                        File size:261728 bytes
                                                                                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.477448915.0000000003BF9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.478901145.00000000060C0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.473461080.0000000002BB1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.478438953.00000000052B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.478438953.00000000052B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                        • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.471043207.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:03:51:45
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp3DFC.tmp'
                                                                                        Imagebase:0x140000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:45
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6b2800000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:46
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp41B6.tmp'
                                                                                        Imagebase:0x140000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:46
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0
                                                                                        Imagebase:0x730000
                                                                                        File size:261728 bytes
                                                                                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:03:51:46
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6b2800000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:46
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6b2800000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:03:51:48
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                        Imagebase:0x920000
                                                                                        File size:261728 bytes
                                                                                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Antivirus matches:
                                                                                        • Detection: 0%, Virustotal, Browse
                                                                                        • Detection: 0%, Metadefender, Browse
                                                                                        • Detection: 0%, ReversingLabs
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:03:51:49
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6b2800000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:03:51:53
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                        Imagebase:0x120000
                                                                                        File size:261728 bytes
                                                                                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET

                                                                                        General

                                                                                        Start time:03:51:53
                                                                                        Start date:21/07/2021
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6b2800000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        Disassembly

                                                                                        Code Analysis

                                                                                        Reset < >