Loading ...

Play interactive tourEdit tour

Windows Analysis Report vHLZ6AHJFY.exe

Overview

General Information

Sample Name:vHLZ6AHJFY.exe
Analysis ID:458708
MD5:e7f52d9d50e6d2776d301b5a7e03b662
SHA1:3382b97a08277306637e074f08814b728bc225cc
SHA256:fcf8936d333a76b64672ae8c445531efc277c0ad3222720e1c4b43573b681375
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • vHLZ6AHJFY.exe (PID: 4640 cmdline: 'C:\Users\user\Desktop\vHLZ6AHJFY.exe' MD5: E7F52D9D50E6D2776D301B5A7E03B662)
    • vHLZ6AHJFY.exe (PID: 4832 cmdline: C:\Users\user\Desktop\vHLZ6AHJFY.exe MD5: E7F52D9D50E6D2776D301B5A7E03B662)
  • dhcpmon.exe (PID: 2680 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: E7F52D9D50E6D2776D301B5A7E03B662)
    • dhcpmon.exe (PID: 5008 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E7F52D9D50E6D2776D301B5A7E03B662)
    • dhcpmon.exe (PID: 6008 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E7F52D9D50E6D2776D301B5A7E03B662)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6a1c2465-7ac5-4f1d-acc5-ef04fcf4", "Group": "Default", "Domain1": "hhjhtggfr.duckdns.org", "Domain2": "dertrefg.duckdns.org", "Port": 8234, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "hhjhtggfr.duckdns.org"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x6943f:$a: NanoCore
    • 0x69498:$a: NanoCore
    • 0x694d5:$a: NanoCore
    • 0x6954e:$a: NanoCore
    • 0x694a1:$b: ClientPlugin
    • 0x694de:$b: ClientPlugin
    • 0x69ddc:$b: ClientPlugin
    • 0x69de9:$b: ClientPlugin
    • 0x5f0a3:$e: KeepAlive
    • 0x69929:$g: LogClientMessage
    • 0x698a9:$i: get_Connected
    • 0x59875:$j: #=q
    • 0x598a5:$j: #=q
    • 0x598e1:$j: #=q
    • 0x59909:$j: #=q
    • 0x59939:$j: #=q
    • 0x59969:$j: #=q
    • 0x59999:$j: #=q
    • 0x599c9:$j: #=q
    • 0x599e5:$j: #=q
    • 0x59a15:$j: #=q
    0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfcf5:$a: NanoCore
      • 0xfd05:$a: NanoCore
      • 0xff39:$a: NanoCore
      • 0xff4d:$a: NanoCore
      • 0xff8d:$a: NanoCore
      • 0xfd54:$b: ClientPlugin
      • 0xff56:$b: ClientPlugin
      • 0xff96:$b: ClientPlugin
      • 0xfe7b:$c: ProjectData
      • 0x10882:$d: DESCrypto
      • 0x1824e:$e: KeepAlive
      • 0x1623c:$g: LogClientMessage
      • 0x12437:$i: get_Connected
      • 0x10bb8:$j: #=q
      • 0x10be8:$j: #=q
      • 0x10c04:$j: #=q
      • 0x10c34:$j: #=q
      • 0x10c50:$j: #=q
      • 0x10c6c:$j: #=q
      • 0x10c9c:$j: #=q
      • 0x10cb8:$j: #=q
      Click to see the 21 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      13.2.dhcpmon.exe.2f89660.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      13.2.dhcpmon.exe.2f89660.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      13.2.dhcpmon.exe.3f74565.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0x23c70:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      • 0x23c9d:$x2: IClientNetworkHost
      13.2.dhcpmon.exe.3f74565.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xb184:$x2: NanoCore.ClientPluginHost
      • 0x23c70:$x2: NanoCore.ClientPluginHost
      • 0xc25f:$s4: PipeCreated
      • 0x24d4b:$s4: PipeCreated
      • 0xb19e:$s5: IClientLoggingHost
      • 0x23c8a:$s5: IClientLoggingHost
      13.2.dhcpmon.exe.3f74565.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 28 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\vHLZ6AHJFY.exe, ProcessId: 4832, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\vHLZ6AHJFY.exe, ProcessId: 4832, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\vHLZ6AHJFY.exe, ProcessId: 4832, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\vHLZ6AHJFY.exe, ProcessId: 4832, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6a1c2465-7ac5-4f1d-acc5-ef04fcf4", "Group": "Default", "Domain1": "hhjhtggfr.duckdns.org", "Domain2": "dertrefg.duckdns.org", "Port": 8234, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "hhjhtggfr.duckdns.org"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 21%
        Multi AV Scanner detection for submitted fileShow sources
        Source: vHLZ6AHJFY.exeVirustotal: Detection: 31%Perma Link
        Source: vHLZ6AHJFY.exeReversingLabs: Detection: 21%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTR
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: vHLZ6AHJFY.exeJoe Sandbox ML: detected
        Source: 13.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: vHLZ6AHJFY.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: vHLZ6AHJFY.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: hhjhtggfr.duckdns.org
        Source: Malware configuration extractorURLs: dertrefg.duckdns.org
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: hhjhtggfr.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.7:49715 -> 203.159.80.186:8234
        Source: Joe Sandbox ViewIP Address: 203.159.80.186 203.159.80.186
        Source: Joe Sandbox ViewASN Name: LOVESERVERSGB LOVESERVERSGB
        Source: unknownDNS traffic detected: queries for: hhjhtggfr.duckdns.org
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: vHLZ6AHJFY.exe, 00000000.00000002.243485690.0000000002551000.00000004.00000001.sdmp, dhcpmon.exe, 00000005.00000002.293431258.00000000023E1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: vHLZ6AHJFY.exe, 00000000.00000002.243024787.00000000007E9000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: dhcpmon.exe, 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 13.2.dhcpmon.exe.2f89660.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeCode function: 0_2_000F4C65
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeCode function: 0_2_00A6C2B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_00054C65
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_00C1C2B0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_00C19990
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_06983B80
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_0698179E
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_069815BF
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_069815D0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_06981210
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_06981200
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00344C65
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_00BC4C65
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0540E471
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0540E480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 13_2_0540BBD4
        Source: vHLZ6AHJFY.exeBinary or memory string: OriginalFilename vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exe, 00000000.00000000.224394981.00000000000F2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGenericSecurityDescript.exe6 vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exe, 00000000.00000002.252836540.0000000006AC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exe, 00000000.00000002.243485690.0000000002551000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameConfigNodeType.dll> vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exe, 00000000.00000002.253509646.0000000006D90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameStoreElement.dllB vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exe, 00000000.00000002.243024787.00000000007E9000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exe, 00000002.00000000.239859981.0000000000492000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGenericSecurityDescript.exe6 vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exeBinary or memory string: OriginalFilenameGenericSecurityDescript.exe6 vs vHLZ6AHJFY.exe
        Source: vHLZ6AHJFY.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 13.2.dhcpmon.exe.2f89660.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.2f89660.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: vHLZ6AHJFY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: dhcpmon.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@19/2
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vHLZ6AHJFY.exe.logJump to behavior
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{6a1c2465-7ac5-4f1d-acc5-ef04fcf454c9}
        Source: vHLZ6AHJFY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: vHLZ6AHJFY.exeVirustotal: Detection: 31%
        Source: vHLZ6AHJFY.exeReversingLabs: Detection: 21%
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeFile read: C:\Users\user\Desktop\vHLZ6AHJFY.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\vHLZ6AHJFY.exe 'C:\Users\user\Desktop\vHLZ6AHJFY.exe'
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess created: C:\Users\user\Desktop\vHLZ6AHJFY.exe C:\Users\user\Desktop\vHLZ6AHJFY.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess created: C:\Users\user\Desktop\vHLZ6AHJFY.exe C:\Users\user\Desktop\vHLZ6AHJFY.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: vHLZ6AHJFY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: vHLZ6AHJFY.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: vHLZ6AHJFY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: vHLZ6AHJFY.exeStatic PE information: 0xFAEB95B0 [Sun May 27 21:08:00 2103 UTC]
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_06980FD6 push ebx; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_06981002 push es; iretd
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_0698107D push es; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.44654724316
        Source: initial sampleStatic PE information: section name: .text entropy: 7.44654724316
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 13.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeFile opened: C:\Users\user\Desktop\vHLZ6AHJFY.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.243870600.00000000026DB000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: vHLZ6AHJFY.exe, 00000000.00000002.243870600.00000000026DB000.00000004.00000001.sdmp, dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: vHLZ6AHJFY.exe, 00000000.00000002.243870600.00000000026DB000.00000004.00000001.sdmp, dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWindow / User API: threadDelayed 3777
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWindow / User API: threadDelayed 4740
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWindow / User API: foregroundWindowGot 597
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWindow / User API: foregroundWindowGot 710
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exe TID: 4932Thread sleep time: -42714s >= -30000s
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exe TID: 2912Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exe TID: 4736Thread sleep time: -7378697629483816s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3588Thread sleep time: -44543s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5864Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 496Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeThread delayed: delay time: 42714
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 44543
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: vHLZ6AHJFY.exeBinary or memory string: %QeMu
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: dhcpmon.exe, 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeProcess created: C:\Users\user\Desktop\vHLZ6AHJFY.exe C:\Users\user\Desktop\vHLZ6AHJFY.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Users\user\Desktop\vHLZ6AHJFY.exe VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Users\user\Desktop\vHLZ6AHJFY.exe VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Users\user\Desktop\vHLZ6AHJFY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: vHLZ6AHJFY.exe, 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f74565.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6ff3c.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.dhcpmon.exe.3f6b106.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.dhcpmon.exe.38fe468.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.vHLZ6AHJFY.exe.3a6e468.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vHLZ6AHJFY.exe PID: 4640, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2680, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6008, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection11Masquerading2Input Capture21Query Registry1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        vHLZ6AHJFY.exe31%VirustotalBrowse
        vHLZ6AHJFY.exe22%ReversingLabsWin32.Trojan.Pwsx
        vHLZ6AHJFY.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe22%ReversingLabsWin32.Trojan.Pwsx

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        13.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        hhjhtggfr.duckdns.org0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        dertrefg.duckdns.org0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        hhjhtggfr.duckdns.org
        203.159.80.186
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          hhjhtggfr.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown
          dertrefg.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.comvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bThevHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                    high
                    http://www.tiro.comdhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersdhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cThevHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleasevHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8vHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                            high
                            http://www.fonts.comvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                              high
                              http://www.sandoll.co.krvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleasevHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevHLZ6AHJFY.exe, 00000000.00000002.243485690.0000000002551000.00000004.00000001.sdmp, dhcpmon.exe, 00000005.00000002.293431258.00000000023E1000.00000004.00000001.sdmpfalse
                                high
                                http://www.sakkal.comvHLZ6AHJFY.exe, 00000000.00000002.251061687.00000000055C0000.00000002.00000001.sdmp, dhcpmon.exe, 00000005.00000002.308306579.0000000005530000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                203.159.80.186
                                hhjhtggfr.duckdns.orgNetherlands
                                47987LOVESERVERSGBtrue

                                Private

                                IP
                                192.168.2.1

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:458708
                                Start date:03.08.2021
                                Start time:17:05:42
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 12m 51s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:vHLZ6AHJFY.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:27
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@8/8@19/2
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • TCP Packets have been reduced to 100
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 13.88.21.125, 104.42.151.234, 52.147.198.201, 23.211.4.86, 20.50.102.62, 20.54.110.249, 40.112.88.60, 80.67.82.235, 80.67.82.211
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                17:06:36API Interceptor1012x Sleep call for process: vHLZ6AHJFY.exe modified
                                17:06:44AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                17:06:57API Interceptor1x Sleep call for process: dhcpmon.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                203.159.80.186NEW PO1100372954 -.docGet hashmaliciousBrowse
                                • newhosteeeee.ydns.eu/putty.exe
                                2711164142.docGet hashmaliciousBrowse
                                • newhosteeeee.ydns.eu/microF.exe
                                N40-MR .docGet hashmaliciousBrowse
                                • newhosteeeee.ydns.eu/microC.exe
                                N40-MR 311.docGet hashmaliciousBrowse
                                • newhosteeeee.ydns.eu/microA.exe
                                PO2100382954 -.docGet hashmaliciousBrowse
                                • newhosteeeee.ydns.eu/microD.exe
                                2fja1Oszs9.exeGet hashmaliciousBrowse
                                • hutyrtit.ydns.eu/microC.exe

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                hhjhtggfr.duckdns.orgNEW PO1100372954 -.docGet hashmaliciousBrowse
                                • 203.159.80.186
                                N40-MR 311.docGet hashmaliciousBrowse
                                • 203.159.80.186
                                Xjf4yH9N2t.exeGet hashmaliciousBrowse
                                • 203.159.80.186
                                wm4J5m8pIK.exeGet hashmaliciousBrowse
                                • 203.159.80.186
                                WrNhr6yUD8.exeGet hashmaliciousBrowse
                                • 37.0.8.214
                                YjnGfifJ4X.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                E8NURjuahU.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                MkASxmQIe3.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                6rkqQM8Ldz.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                bHSfr2q0yu.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                lqtN3Z5Uzp.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                Invoice 406496.docGet hashmaliciousBrowse
                                • 203.159.80.101
                                1OLlrVAlAE.exeGet hashmaliciousBrowse
                                • 203.159.80.101
                                microC.exeGet hashmaliciousBrowse
                                • 203.159.80.101

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                LOVESERVERSGBShipping Details.exeGet hashmaliciousBrowse
                                • 203.159.80.118
                                NEW PO1100372954 -.docGet hashmaliciousBrowse
                                • 203.159.80.165
                                2711164142.docGet hashmaliciousBrowse
                                • 203.159.80.165
                                N40-MR .docGet hashmaliciousBrowse
                                • 203.159.80.186
                                N40-MR 311.docGet hashmaliciousBrowse
                                • 203.159.80.165
                                PO2100382954 -.docGet hashmaliciousBrowse
                                • 203.159.80.186
                                Xjf4yH9N2t.exeGet hashmaliciousBrowse
                                • 203.159.80.165
                                wm4J5m8pIK.exeGet hashmaliciousBrowse
                                • 203.159.80.186
                                2fja1Oszs9.exeGet hashmaliciousBrowse
                                • 203.159.80.186
                                SKM-582649274924.exeGet hashmaliciousBrowse
                                • 203.159.80.93
                                Shipping Details_PDF.exeGet hashmaliciousBrowse
                                • 203.159.80.118
                                eInvoicing.jarGet hashmaliciousBrowse
                                • 203.159.80.23
                                DyxL4y2hv3.exeGet hashmaliciousBrowse
                                • 203.159.80.165
                                ktWmI8zMGs.exeGet hashmaliciousBrowse
                                • 203.159.80.182
                                fBR05jzjti.exeGet hashmaliciousBrowse
                                • 203.159.80.165
                                Original Shipping .docGet hashmaliciousBrowse
                                • 203.159.80.165
                                hfJdO3BjO0.exeGet hashmaliciousBrowse
                                • 203.159.80.107
                                No.IV21002542.docGet hashmaliciousBrowse
                                • 203.159.80.107
                                payment details.docGet hashmaliciousBrowse
                                • 203.159.80.107
                                DblVVdaNgC.exeGet hashmaliciousBrowse
                                • 203.159.80.107

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):835072
                                Entropy (8bit):7.439063931141525
                                Encrypted:false
                                SSDEEP:12288:SZdWFS44N+vWrz4C89yIkjPeO6gSxW61AannR6VJj134bGlvpmjz2iN:SbWFSn+vW4F5yPeJgqWkAYngHj1dpY1
                                MD5:E7F52D9D50E6D2776D301B5A7E03B662
                                SHA1:3382B97A08277306637E074F08814B728BC225CC
                                SHA-256:FCF8936D333A76B64672AE8C445531EFC277C0AD3222720E1C4B43573B681375
                                SHA-512:924B09B696ED70EF112DE29B61F90AB01E818F901EBA58F21685E95EBE1B4F0810DFBB2D28CDF41B1E1C58CB179EB6DF0A19969180E67ED335EC084E65423FD0
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 22%
                                Reputation:low
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................... ............@.....................................O...................................x................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........l........... ...X............................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o^...(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview: [ZoneTransfer]....ZoneId=0
                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1314
                                Entropy (8bit):5.350128552078965
                                Encrypted:false
                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                Malicious:false
                                Reputation:unknown
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vHLZ6AHJFY.exe.log
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1314
                                Entropy (8bit):5.350128552078965
                                Encrypted:false
                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                Malicious:true
                                Reputation:unknown
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2088
                                Entropy (8bit):7.024371743172393
                                Encrypted:false
                                SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC0IlCe
                                MD5:0D6805D12813A857D50D42D6EE2CCAB0
                                SHA1:78D83F009D842F21FE2AB0EAFFD00E5AAD1776F4
                                SHA-256:182E0F8AA959549D61C66D049645BA8445D86AEAD2B8C3552A9836FA1E5BD484
                                SHA-512:5B29496F3AB3CCB915CF37042F4956BB00E577B5F15457A5A739BE1BD50C481FB7E3297EED575DCA7A7BD30ECBC140DD3666CD7DEDD25DFB7AEB41A1B5BEDA4A
                                Malicious:false
                                Reputation:unknown
                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:ISO-8859 text, with no line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:N4n:W
                                MD5:C2BD38A6DB63769773CAFA759E408A99
                                SHA1:C865D09925B221950EEA216FEAEF74C6F9BB4EE9
                                SHA-256:D62FD7B51C8B8FBD978A82CE646961CA86E5DEE11C3DA8CCF5DF4877A14E56C6
                                SHA-512:627141212397F00ED3D8E24BDAA2E3B1A3C60ADC3779BA24DF96773F87B04D23E98B1393E684C2B90A529C6012E5D87F818408BDDCAB2E07D0D3D24EA02EBF7A
                                Malicious:true
                                Reputation:unknown
                                Preview: "%:..V.H
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:data
                                Category:modified
                                Size (bytes):40
                                Entropy (8bit):5.153055907333276
                                Encrypted:false
                                SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                MD5:4E5E92E2369688041CC82EF9650EDED2
                                SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                Malicious:false
                                Reputation:unknown
                                Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                Process:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):327432
                                Entropy (8bit):7.99938831605763
                                Encrypted:true
                                SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                Malicious:false
                                Reputation:unknown
                                Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.439063931141525
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:vHLZ6AHJFY.exe
                                File size:835072
                                MD5:e7f52d9d50e6d2776d301b5a7e03b662
                                SHA1:3382b97a08277306637e074f08814b728bc225cc
                                SHA256:fcf8936d333a76b64672ae8c445531efc277c0ad3222720e1c4b43573b681375
                                SHA512:924b09b696ed70ef112de29b61f90ab01e818f901eba58f21685e95ebe1b4f0810dfbb2d28cdf41b1e1c58cb179eb6df0a19969180e67ed335ec084e65423fd0
                                SSDEEP:12288:SZdWFS44N+vWrz4C89yIkjPeO6gSxW61AannR6VJj134bGlvpmjz2iN:SbWFSn+vW4F5yPeJgqWkAYngHj1dpY1
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................... ............@................................

                                File Icon

                                Icon Hash:00828e8e8686b000

                                Static PE Info

                                General

                                Entrypoint:0x4cd3e6
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0xFAEB95B0 [Sun May 27 21:08:00 2103 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                Entrypoint Preview

                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xcd3940x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x5ec.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xcd3780x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xcb3ec0xcb400False0.789118955643data7.44654724316IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0xce0000x5ec0x600False0.430989583333data4.2010150696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xd00000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_VERSION0xce0900x35cdata
                                RT_MANIFEST0xce3fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                Imports

                                DLLImport
                                mscoree.dll_CorExeMain

                                Version Infos

                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright 2020
                                Assembly Version1.0.0.0
                                InternalNameGenericSecurityDescript.exe
                                FileVersion1.0.0.0
                                CompanyName
                                LegalTrademarks
                                Comments
                                ProductNameModul VB 3
                                ProductVersion1.0.0.0
                                FileDescriptionModul VB 3
                                OriginalFilenameGenericSecurityDescript.exe

                                Network Behavior

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Aug 3, 2021 17:06:41.419050932 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.447469950 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.447678089 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.492496967 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.549215078 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.559194088 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.588100910 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.627763987 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.704857111 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.705209970 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.749450922 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.749484062 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.749509096 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.749532938 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.749650002 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.778403997 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778470039 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778492928 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778517962 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778541088 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778562069 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778578997 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.778590918 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778614998 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.778701067 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.778711081 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.807434082 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807476044 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807497978 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807518005 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807537079 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807554960 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807564974 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.807574034 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807595015 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807598114 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.807615042 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807637930 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807640076 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.807660103 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807678938 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.807687044 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.807760000 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.807764053 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.808185101 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.808218002 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.808238029 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.808255911 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.808341026 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.836631060 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836668015 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836693048 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836714029 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836739063 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836761951 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836771011 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.836785078 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836807966 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836831093 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836852074 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836857080 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.836877108 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836899042 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836924076 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836925030 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.836949110 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836971045 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.836977959 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.836993933 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837017059 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837018013 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837039948 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837061882 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837084055 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837088108 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837110043 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837133884 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837155104 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837157965 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837177992 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837199926 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837223053 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837224007 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837245941 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837269068 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837269068 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837295055 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837316990 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837338924 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837341070 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837362051 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.837387085 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.837642908 CEST497158234192.168.2.7203.159.80.186
                                Aug 3, 2021 17:06:41.866172075 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.866205931 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.866225004 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.866242886 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.866260052 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.866277933 CEST823449715203.159.80.186192.168.2.7
                                Aug 3, 2021 17:06:41.866293907 CEST823449715203.159.80.186192.168.2.7

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Aug 3, 2021 17:06:21.542763948 CEST5659053192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:21.571151018 CEST53565908.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:22.590699911 CEST6050153192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:22.618423939 CEST53605018.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:23.600570917 CEST5377553192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:23.626568079 CEST53537758.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:24.638501883 CEST5183753192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:24.671672106 CEST53518378.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:26.135978937 CEST5541153192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:26.164107084 CEST53554118.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:27.495162010 CEST6366853192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:27.527815104 CEST53636688.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:28.636183023 CEST5464053192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:28.668950081 CEST53546408.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:29.894224882 CEST5873953192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:29.929974079 CEST53587398.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:31.288849115 CEST6033853192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:31.316510916 CEST53603388.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:32.746481895 CEST5871753192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:32.773911953 CEST53587178.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:35.052634954 CEST5976253192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:35.077202082 CEST53597628.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:36.071739912 CEST5432953192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:36.102565050 CEST53543298.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:37.123631001 CEST5805253192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:37.151098013 CEST53580528.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:38.190502882 CEST5400853192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:38.225246906 CEST53540088.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:39.252865076 CEST5945153192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:39.285063982 CEST53594518.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:39.957365990 CEST5291453192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:39.991733074 CEST53529148.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:41.237966061 CEST6456953192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:41.265094995 CEST5281653192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:41.265448093 CEST53645698.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:41.395359993 CEST53528168.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:42.283556938 CEST5078153192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:42.315649986 CEST53507818.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:43.006484985 CEST5423053192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:43.031563997 CEST53542308.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:43.664462090 CEST5491153192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:43.690613031 CEST53549118.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:46.775603056 CEST4995853192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:46.811254978 CEST53499588.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:48.393317938 CEST5086053192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:48.524399996 CEST53508608.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:50.426842928 CEST5045253192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:50.462388992 CEST53504528.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:54.451605082 CEST5973053192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:54.484944105 CEST53597308.8.8.8192.168.2.7
                                Aug 3, 2021 17:06:54.889625072 CEST5931053192.168.2.78.8.8.8
                                Aug 3, 2021 17:06:54.923458099 CEST53593108.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:00.969794989 CEST5191953192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:01.004370928 CEST53519198.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:07.044657946 CEST6429653192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:07.080137014 CEST53642968.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:12.698101997 CEST5668053192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:12.732578993 CEST53566808.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:18.692414045 CEST5882053192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:18.732935905 CEST53588208.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:18.848773003 CEST6098353192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:18.882757902 CEST53609838.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:19.188673019 CEST4924753192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:19.221285105 CEST53492478.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:19.272763968 CEST5228653192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:19.307548046 CEST53522868.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:19.954912901 CEST5606453192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:20.017827988 CEST53560648.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:20.513102055 CEST6374453192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:20.548520088 CEST53637448.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:21.143942118 CEST6145753192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:21.179691076 CEST53614578.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:21.657195091 CEST5836753192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:21.692867994 CEST53583678.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:22.437619925 CEST6059953192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:22.470551014 CEST53605998.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:23.949278116 CEST5957153192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:23.984989882 CEST53595718.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:24.825263023 CEST5268953192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:24.858367920 CEST53526898.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:25.584248066 CEST5029053192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:25.617404938 CEST53502908.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:26.557281017 CEST6042753192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:26.591330051 CEST53604278.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:30.959038019 CEST5620953192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:30.991909981 CEST53562098.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:31.709007025 CEST5958253192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:31.752811909 CEST53595828.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:37.138364077 CEST6094953192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:37.173894882 CEST53609498.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:43.207992077 CEST5854253192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:43.240693092 CEST53585428.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:49.125431061 CEST5917953192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:49.254106998 CEST53591798.8.8.8192.168.2.7
                                Aug 3, 2021 17:07:56.132236004 CEST6092753192.168.2.78.8.8.8
                                Aug 3, 2021 17:07:56.166098118 CEST53609278.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:02.321283102 CEST5785453192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:02.454139948 CEST53578548.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:03.787842035 CEST6202653192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:03.835972071 CEST53620268.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:06.960706949 CEST5945353192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:07.011775970 CEST53594538.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:09.583043098 CEST6246853192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:09.619055033 CEST53624688.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:16.466579914 CEST5256353192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:16.499321938 CEST53525638.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:22.695369959 CEST5472153192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:22.728216887 CEST53547218.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:28.805661917 CEST6282653192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:28.840946913 CEST53628268.8.8.8192.168.2.7
                                Aug 3, 2021 17:08:34.787343025 CEST6204653192.168.2.78.8.8.8
                                Aug 3, 2021 17:08:34.821742058 CEST53620468.8.8.8192.168.2.7

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Aug 3, 2021 17:06:41.265094995 CEST192.168.2.78.8.8.80xcfe7Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:06:48.393317938 CEST192.168.2.78.8.8.80x7cddStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:06:54.889625072 CEST192.168.2.78.8.8.80x11f3Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:00.969794989 CEST192.168.2.78.8.8.80x402aStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:07.044657946 CEST192.168.2.78.8.8.80xfdcaStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:12.698101997 CEST192.168.2.78.8.8.80x22a8Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:18.848773003 CEST192.168.2.78.8.8.80xe20eStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:24.825263023 CEST192.168.2.78.8.8.80xa8bdStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:30.959038019 CEST192.168.2.78.8.8.80x6954Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:37.138364077 CEST192.168.2.78.8.8.80xc73bStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:43.207992077 CEST192.168.2.78.8.8.80x73bStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:49.125431061 CEST192.168.2.78.8.8.80x93cfStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:56.132236004 CEST192.168.2.78.8.8.80x9baaStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:02.321283102 CEST192.168.2.78.8.8.80x992fStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:09.583043098 CEST192.168.2.78.8.8.80xef63Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:16.466579914 CEST192.168.2.78.8.8.80xf44bStandard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:22.695369959 CEST192.168.2.78.8.8.80xa8b4Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:28.805661917 CEST192.168.2.78.8.8.80x812Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:34.787343025 CEST192.168.2.78.8.8.80x4c87Standard query (0)hhjhtggfr.duckdns.orgA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Aug 3, 2021 17:06:41.395359993 CEST8.8.8.8192.168.2.70xcfe7No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:06:48.524399996 CEST8.8.8.8192.168.2.70x7cddNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:06:54.923458099 CEST8.8.8.8192.168.2.70x11f3No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:01.004370928 CEST8.8.8.8192.168.2.70x402aNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:07.080137014 CEST8.8.8.8192.168.2.70xfdcaNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:12.732578993 CEST8.8.8.8192.168.2.70x22a8No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:18.882757902 CEST8.8.8.8192.168.2.70xe20eNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:24.858367920 CEST8.8.8.8192.168.2.70xa8bdNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:30.991909981 CEST8.8.8.8192.168.2.70x6954No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:37.173894882 CEST8.8.8.8192.168.2.70xc73bNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:43.240693092 CEST8.8.8.8192.168.2.70x73bNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:49.254106998 CEST8.8.8.8192.168.2.70x93cfNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:07:56.166098118 CEST8.8.8.8192.168.2.70x9baaNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:02.454139948 CEST8.8.8.8192.168.2.70x992fNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:09.619055033 CEST8.8.8.8192.168.2.70xef63No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:16.499321938 CEST8.8.8.8192.168.2.70xf44bNo error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:22.728216887 CEST8.8.8.8192.168.2.70xa8b4No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:28.840946913 CEST8.8.8.8192.168.2.70x812No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)
                                Aug 3, 2021 17:08:34.821742058 CEST8.8.8.8192.168.2.70x4c87No error (0)hhjhtggfr.duckdns.org203.159.80.186A (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:17:06:30
                                Start date:03/08/2021
                                Path:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\vHLZ6AHJFY.exe'
                                Imagebase:0xf0000
                                File size:835072 bytes
                                MD5 hash:E7F52D9D50E6D2776D301B5A7E03B662
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.243870600.00000000026DB000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.246214384.0000000003559000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:17:06:37
                                Start date:03/08/2021
                                Path:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\vHLZ6AHJFY.exe
                                Imagebase:0x490000
                                File size:835072 bytes
                                MD5 hash:E7F52D9D50E6D2776D301B5A7E03B662
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:low

                                General

                                Start time:17:06:53
                                Start date:03/08/2021
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                Imagebase:0x50000
                                File size:835072 bytes
                                MD5 hash:E7F52D9D50E6D2776D301B5A7E03B662
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.296482527.000000000256B000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.302655095.00000000033E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 22%, ReversingLabs
                                Reputation:low

                                General

                                Start time:17:06:59
                                Start date:03/08/2021
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Imagebase:0x340000
                                File size:835072 bytes
                                MD5 hash:E7F52D9D50E6D2776D301B5A7E03B662
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:17:07:00
                                Start date:03/08/2021
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Imagebase:0xbc0000
                                File size:835072 bytes
                                MD5 hash:E7F52D9D50E6D2776D301B5A7E03B662
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.316057670.0000000002F21000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.315036949.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.316141333.0000000003F29000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >