Loading ...

Play interactive tourEdit tour

Windows Analysis Report Debitnote-s3update.exe

Overview

General Information

Sample Name:Debitnote-s3update.exe
Analysis ID:508706
MD5:f162063c8a3c61db87238f88e2e82a81
SHA1:f8e30f49ca71e8f733774c5bd0f770659bdb93ff
SHA256:359c0c66cbb2eabf2771a62a2a87762734b73457cf431d1a7e0c94e3a4ab3cfa
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Debitnote-s3update.exe (PID: 6488 cmdline: 'C:\Users\user\Desktop\Debitnote-s3update.exe' MD5: F162063C8A3C61DB87238F88E2E82A81)
    • Debitnote-s3update.exe (PID: 5744 cmdline: C:\Users\user\Desktop\Debitnote-s3update.exe MD5: F162063C8A3C61DB87238F88E2E82A81)
  • dhcpmon.exe (PID: 4240 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: F162063C8A3C61DB87238F88E2E82A81)
    • dhcpmon.exe (PID: 3476 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: F162063C8A3C61DB87238F88E2E82A81)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "baa1bd16-ba50-4743-8b51-41c36ee5", "Group": "Default", "Domain1": "kamuchehddhgfgf.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.453"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x238a7:$a: NanoCore
    • 0x23900:$a: NanoCore
    • 0x2393d:$a: NanoCore
    • 0x239b6:$a: NanoCore
    • 0x23909:$b: ClientPlugin
    • 0x23946:$b: ClientPlugin
    • 0x24244:$b: ClientPlugin
    • 0x24251:$b: ClientPlugin
    • 0x1b100:$e: KeepAlive
    • 0x23d91:$g: LogClientMessage
    • 0x23d11:$i: get_Connected
    • 0x158d9:$j: #=q
    • 0x15909:$j: #=q
    • 0x15945:$j: #=q
    • 0x1596d:$j: #=q
    • 0x1599d:$j: #=q
    • 0x159cd:$j: #=q
    • 0x159fd:$j: #=q
    • 0x15a2d:$j: #=q
    • 0x15a49:$j: #=q
    • 0x15a79:$j: #=q
    00000000.00000002.689973271.00000000029E2000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 19 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        8.2.dhcpmon.exe.2ce3ac8.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        8.2.dhcpmon.exe.2ce3ac8.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        0.2.Debitnote-s3update.exe.3aef648.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe38d:$x1: NanoCore.ClientPluginHost
        • 0xe3ca:$x2: IClientNetworkHost
        • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        0.2.Debitnote-s3update.exe.3aef648.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe105:$x1: NanoCore Client.exe
        • 0xe38d:$x2: NanoCore.ClientPluginHost
        • 0xf9c6:$s1: PluginCommand
        • 0xf9ba:$s2: FileCommand
        • 0x1086b:$s3: PipeExists
        • 0x16622:$s4: PipeCreated
        • 0xe3b7:$s5: IClientLoggingHost
        0.2.Debitnote-s3update.exe.3aef648.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          Click to see the 37 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Debitnote-s3update.exe, ProcessId: 5744, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Debitnote-s3update.exe, ProcessId: 5744, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Debitnote-s3update.exe, ProcessId: 5744, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Debitnote-s3update.exe, ProcessId: 5744, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "baa1bd16-ba50-4743-8b51-41c36ee5", "Group": "Default", "Domain1": "kamuchehddhgfgf.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.453"}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Debitnote-s3update.exeVirustotal: Detection: 55%Perma Link
          Source: Debitnote-s3update.exeReversingLabs: Detection: 58%
          Multi AV Scanner detection for domain / URLShow sources
          Source: kamuchehddhgfgf.ddns.netVirustotal: Detection: 7%Perma Link
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 58%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTR
          Machine Learning detection for sampleShow sources
          Source: Debitnote-s3update.exeJoe Sandbox ML: detected
          Machine Learning detection for dropped fileShow sources
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
          Source: 8.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: Debitnote-s3update.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Debitnote-s3update.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49756 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49757 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49760 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49761 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49762 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49764 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49765 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49768 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49794 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49811 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49813 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49814 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49815 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49816 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49838 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49846 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49847 -> 37.0.10.22:1187
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49848 -> 37.0.10.22:1187
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs:
          Source: Malware configuration extractorURLs: kamuchehddhgfgf.ddns.net
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: kamuchehddhgfgf.ddns.net
          Source: Joe Sandbox ViewASN Name: WKD-ASIE WKD-ASIE
          Source: Joe Sandbox ViewIP Address: 37.0.10.22 37.0.10.22
          Source: global trafficTCP traffic: 192.168.2.4:49756 -> 37.0.10.22:1187
          Source: Debitnote-s3update.exe, 00000000.00000003.673391482.0000000004DC7000.00000004.00000001.sdmpString found in binary or memory: http://en.w0
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpString found in binary or memory: http://google.com
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Debitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: Debitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comb
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: Debitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comormY
          Source: Debitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comyrl
          Source: Debitnote-s3update.exe, 00000000.00000002.691818891.0000000006A80000.00000004.00020000.sdmp, dhcpmon.exe, 00000006.00000002.733445906.00000000068F0000.00000004.00020000.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: Debitnote-s3update.exe, 00000000.00000003.678459976.0000000004DCB000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: Debitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: Debitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comm
          Source: Debitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comoitu
          Source: Debitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comrsivo
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: Debitnote-s3update.exe, 00000000.00000003.673181425.0000000004DDB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com)
          Source: Debitnote-s3update.exe, 00000000.00000003.673155441.0000000004DDB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comicC
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: Debitnote-s3update.exe, 00000000.00000003.673075826.0000000004DDB000.00000004.00000001.sdmp, Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: Debitnote-s3update.exe, 00000000.00000003.673776926.0000000004DDB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.como
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: kamuchehddhgfgf.ddns.net
          Source: dhcpmon.exe, 00000006.00000002.727893281.0000000000E98000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: dhcpmon.exe, 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTR

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 8.2.dhcpmon.exe.2ce3ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.3.Debitnote-s3update.exe.46b5f85.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.3.Debitnote-s3update.exe.469bf2e.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.3.Debitnote-s3update.exe.46b0559.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.3.Debitnote-s3update.exe.46b5f85.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.3.Debitnote-s3update.exe.469bf2e.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Debitnote-s3update.exe PID: 5744, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Debitnote-s3update.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 8.2.dhcpmon.exe.2ce3ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.dhcpmon.exe.2ce3ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.3.Debitnote-s3update.exe.46b5f85.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.3.Debitnote-s3update.exe.46b5f85.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 4.3.Debitnote-s3update.exe.469bf2e.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.3.Debitnote-s3update.exe.469bf2e.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 4.3.Debitnote-s3update.exe.46b0559.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.3.Debitnote-s3update.exe.46b5f85.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.3.Debitnote-s3update.exe.469bf2e.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Debitnote-s3update.exe PID: 5744, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_00CC2477
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D9CE8
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D0110
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D1DD8
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D2AE0
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D2AD1
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D9CD8
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D2D28
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D2D18
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D0100
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D8978
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_023D7DCA
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02869CE8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02861DD8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02860110
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02862AD1
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02862AE0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02869CD8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02860100
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02862D18
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02862D28
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_02868978
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_04DC2FA8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_04DC23A0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_04DC3850
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_04DC306F
          Source: Debitnote-s3update.exe, 00000000.00000002.692744697.0000000006C70000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll< vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000000.00000000.672083266.000000000035E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIAppIdAuthori.exe8 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000000.00000002.691818891.0000000006A80000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameTaskNode.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000000.688461168.0000000000B9E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIAppIdAuthori.exe8 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exeBinary or memory string: OriginalFilenameIAppIdAuthori.exe8 vs Debitnote-s3update.exe
          Source: Debitnote-s3update.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: dhcpmon.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: Debitnote-s3update.exeVirustotal: Detection: 55%
          Source: Debitnote-s3update.exeReversingLabs: Detection: 58%
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile read: C:\Users\user\Desktop\Debitnote-s3update.exeJump to behavior
          Source: Debitnote-s3update.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Debitnote-s3update.exe 'C:\Users\user\Desktop\Debitnote-s3update.exe'
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess created: C:\Users\user\Desktop\Debitnote-s3update.exe C:\Users\user\Desktop\Debitnote-s3update.exe
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess created: C:\Users\user\Desktop\Debitnote-s3update.exe C:\Users\user\Desktop\Debitnote-s3update.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Debitnote-s3update.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@6/9@18/2
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: Debitnote-s3update.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{baa1bd16-ba50-4743-8b51-41c36ee5d9d4}
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Debitnote-s3update.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Debitnote-s3update.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: Debitnote-s3update.exe, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.Debitnote-s3update.exe.2b0000.0.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.Debitnote-s3update.exe.2b0000.0.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: dhcpmon.exe.4.dr, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.Debitnote-s3update.exe.af0000.0.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.0.dhcpmon.exe.5e0000.0.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.2.dhcpmon.exe.5e0000.0.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 8.0.dhcpmon.exe.540000.0.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 8.2.dhcpmon.exe.540000.1.unpack, GameLibrary/InfoForm.cs.Net Code: WinAPI_Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeCode function: 0_2_002B6225 push cs; ret
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_005E6128 push cs; ret
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00546128 push cs; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.86674743084
          Source: initial sampleStatic PE information: section name: .text entropy: 7.86674743084
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 8.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeFile opened: C:\Users\user\Desktop\Debitnote-s3update.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.29c7ab8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.2d17ad8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.689973271.00000000029E2000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.689951422.00000000029C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.728551090.0000000002D32000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Debitnote-s3update.exe PID: 6488, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4240, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Debitnote-s3update.exe, 00000000.00000002.689973271.00000000029E2000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: Debitnote-s3update.exe, 00000000.00000002.689973271.00000000029E2000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6500Thread sleep time: -40633s >= -30000s
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 5552Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6948Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6948Thread sleep count: 175 > 30
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6948Thread sleep count: 193 > 30
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 7080Thread sleep count: 36 > 30
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6948Thread sleep count: 37 > 30
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6960Thread sleep count: 69 > 30
          Source: C:\Users\user\Desktop\Debitnote-s3update.exe TID: 6960Thread sleep time: -1380000s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2016Thread sleep time: -38442s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3844Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6616Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWindow / User API: foregroundWindowGot 593
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWindow / User API: foregroundWindowGot 638
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeThread delayed: delay time: 40633
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 38442
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: dhcpmon.exe, 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: dhcpmon.exe, 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: dhcpmon.exe, 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: dhcpmon.exe, 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeMemory written: C:\Users\user\Desktop\Debitnote-s3update.exe base: 400000 value starts with: 4D5A
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeProcess created: C:\Users\user\Desktop\Debitnote-s3update.exe C:\Users\user\Desktop\Debitnote-s3update.exe
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Source: Debitnote-s3update.exe, 00000004.00000003.698862095.000000000134E000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: Debitnote-s3update.exe, 00000004.00000003.699550050.000000000134E000.00000004.00000001.sdmpBinary or memory string: Program Managerd`
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\Debitnote-s3update.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTR

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
          Source: Debitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
          Source: dhcpmon.exe, 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe, 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d095fe.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d0e434.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.dhcpmon.exe.3d12a5d.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.dhcpmon.exe.3e3f648.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Debitnote-s3update.exe.3aef648.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3476, type: MEMORYSTR

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection112Masquerading2Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Debitnote-s3update.exe55%VirustotalBrowse
          Debitnote-s3update.exe58%ReversingLabsByteCode-MSIL.Trojan.Woreflint
          Debitnote-s3update.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe58%ReversingLabsByteCode-MSIL.Trojan.Woreflint

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          8.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

          Domains

          SourceDetectionScannerLabelLink
          kamuchehddhgfgf.ddns.net8%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          0%Avira URL Cloudsafe
          http://www.carterandcone.comb0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          kamuchehddhgfgf.ddns.net0%Avira URL Cloudsafe
          http://www.fonts.com)0%Avira URL Cloudsafe
          http://www.tiro.como0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.fonts.comicC0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.carterandcone.comyrl0%Avira URL Cloudsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.fontbureau.comoitu0%URL Reputationsafe
          http://www.carterandcone.comormY0%Avira URL Cloudsafe
          http://www.fontbureau.comm0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://en.w00%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.comrsivo0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          kamuchehddhgfgf.ddns.net
          37.0.10.22
          truetrueunknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          true
          • Avira URL Cloud: safe
          low
          kamuchehddhgfgf.ddns.nettrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.carterandcone.combDebitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                    high
                    http://www.fonts.com)Debitnote-s3update.exe, 00000000.00000003.673181425.0000000004DDB000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.tiro.comoDebitnote-s3update.exe, 00000000.00000003.673776926.0000000004DDB000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://google.comDebitnote-s3update.exe, 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmpfalse
                        high
                        http://www.carterandcone.comDebitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comaDebitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.collada.org/2005/11/COLLADASchema9DoneDebitnote-s3update.exe, 00000000.00000002.691818891.0000000006A80000.00000004.00020000.sdmp, dhcpmon.exe, 00000006.00000002.733445906.00000000068F0000.00000004.00020000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comicCDebitnote-s3update.exe, 00000000.00000003.673155441.0000000004DDB000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.comDebitnote-s3update.exe, 00000000.00000003.673075826.0000000004DDB000.00000004.00000001.sdmp, Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comyrlDebitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.typography.netDDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-user.htmlDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comoituDebitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comormYDebitnote-s3update.exe, 00000000.00000003.674897879.0000000004DC4000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.commDebitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://en.w0Debitnote-s3update.exe, 00000000.00000003.673391482.0000000004DC7000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8Debitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                              high
                              http://www.fonts.comDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comDebitnote-s3update.exe, 00000000.00000002.691258261.0000000005FD2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/Debitnote-s3update.exe, 00000000.00000003.678459976.0000000004DCB000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.comrsivoDebitnote-s3update.exe, 00000000.00000002.689752440.0000000000D10000.00000004.00000040.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  37.0.10.22
                                  kamuchehddhgfgf.ddns.netNetherlands
                                  198301WKD-ASIEtrue

                                  Private

                                  IP
                                  192.168.2.1

                                  General Information

                                  Joe Sandbox Version:33.0.0 White Diamond
                                  Analysis ID:508706
                                  Start date:25.10.2021
                                  Start time:14:44:09
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 11m 10s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:Debitnote-s3update.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:18
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@6/9@18/2
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 1% (good quality ratio 0.5%)
                                  • Quality average: 21.5%
                                  • Quality standard deviation: 30.4%
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • TCP Packets have been reduced to 100
                                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.82.209.183, 173.222.108.210, 173.222.108.226, 20.54.110.249, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.82.210.154
                                  • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  14:45:16API Interceptor833x Sleep call for process: Debitnote-s3update.exe modified
                                  14:45:22AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                  14:45:33API Interceptor1x Sleep call for process: dhcpmon.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  37.0.10.22Purchase Order.exeGet hashmaliciousBrowse
                                    Order.exeGet hashmaliciousBrowse
                                      Order.exeGet hashmaliciousBrowse
                                        My CV.exeGet hashmaliciousBrowse
                                          Quote.exeGet hashmaliciousBrowse
                                            Invoice and waybill.exeGet hashmaliciousBrowse
                                              My Resume.exeGet hashmaliciousBrowse
                                                Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                  Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                    Balance Payment.exeGet hashmaliciousBrowse
                                                      PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                        Circular PSSB Parts Disc Credit Term (Dlr) s.exeGet hashmaliciousBrowse
                                                          T.T.exeGet hashmaliciousBrowse

                                                            Domains

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            kamuchehddhgfgf.ddns.netOrder.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            My CV.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Quote.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Invoice and waybill.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            My Resume.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Balance Payment.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Circular PSSB Parts Disc Credit Term (Dlr) s.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            T.T.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22

                                                            ASN

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            WKD-ASIESKypfeGItc.exeGet hashmaliciousBrowse
                                                            • 37.0.10.190
                                                            Purchase Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            HBC.exeGet hashmaliciousBrowse
                                                            • 37.0.10.15
                                                            85QKQNr7mm.xlsxGet hashmaliciousBrowse
                                                            • 37.0.10.15
                                                            AB948F038175411DC326A1AAD83DF48D6B65632501551.exeGet hashmaliciousBrowse
                                                            • 37.0.8.235
                                                            FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exeGet hashmaliciousBrowse
                                                            • 37.0.10.214
                                                            3qZB2fO4lG.exeGet hashmaliciousBrowse
                                                            • 37.0.8.193
                                                            365F984ABE68DDD398D7B749FB0E69B0F29DAF86F0E3E.exeGet hashmaliciousBrowse
                                                            • 37.0.11.8
                                                            CQUOTATION REQUEST4.scr.exeGet hashmaliciousBrowse
                                                            • 37.0.10.252
                                                            gy6JsH7kJx.exeGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            About company.docGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            SecuriteInfo.com.Virus.Win32.Save.a.26327.exeGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            ifCgoV9Ykq.exeGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            Agent_UDPRat.exeGet hashmaliciousBrowse
                                                            • 37.0.11.171
                                                            Agent_UDPRat.exeGet hashmaliciousBrowse
                                                            • 37.0.11.171
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            download.dat.exeGet hashmaliciousBrowse
                                                            • 37.0.10.13
                                                            TA9015--AA-TA9015-000786-AA-TA9015--AA-TA9015.exeGet hashmaliciousBrowse
                                                            • 37.0.10.13
                                                            My CV.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):701952
                                                            Entropy (8bit):7.859478577304115
                                                            Encrypted:false
                                                            SSDEEP:12288:jTq9Ad4zNrL8AuoWBaPXcP9p5YuD1E4qgPJc5e+vzvUxIXN/rN:jTwAGjuoWQclbDDmSmz1/rN
                                                            MD5:F162063C8A3C61DB87238F88E2E82A81
                                                            SHA1:F8E30F49CA71E8F733774C5BD0F770659BDB93FF
                                                            SHA-256:359C0C66CBB2EABF2771A62A2A87762734B73457CF431D1A7E0C94E3A4AB3CFA
                                                            SHA-512:C3BCDFC4BFBE63D3A0B1A0CAD7A21C28DE7948E8C5571DFCE21045E2849F1AED931F3DF504B8C3ADC0ED3D6A1775754FC939B5FA3DA752C56D9843F2EED250B3
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 58%
                                                            Reputation:low
                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....|sa..............0.............Z.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...`.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................<.......H.......lV...A......a........2...........................................0..@.............+...o.......(.......(........X...o....2.(..... ....(.....*.0...........~......eo........+..*...0...........~......o.....+..*.s.........*...0..j.........(......(......{......,..(.......(......(......(......(......(.......{....o.....1.(.......+....-..(.....*...0............{......9.....r...p(.......+~...+i..{......(....o|........,J..{......(....o|.....r...p..o....o......o.....<.....o.....<
                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: [ZoneTransfer]....ZoneId=0
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Debitnote-s3update.exe.log
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):525
                                                            Entropy (8bit):5.2874233355119316
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                            MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):525
                                                            Entropy (8bit):5.2874233355119316
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                            MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):232
                                                            Entropy (8bit):7.117516745217376
                                                            Encrypted:false
                                                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7V9Nhyleajl0fuONKcpMe5i:X4LEnybgCFCtvd7V9NYRj+GONKaMv
                                                            MD5:CF55DF705B79F961ED069D8E84D2AF1C
                                                            SHA1:574CDF36753CF356A25872BCCAA3CC6FFCD5D23F
                                                            SHA-256:DF982E10764D21FCB1469EB6EA1175AC69544C68900B0DD8C79A0FE8A8F300F5
                                                            SHA-512:518A037DF1D6FBC8A296DA5B96B67E073FB1F674090AFE3243E52A65B169DE35FC041C2C05F7EEF9EC74A0100A422E53B3D7D920E5ADF6CE42B82FE94244F5DE
                                                            Malicious:false
                                                            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL...Q.F...@.h.......y.[....e..<..n....B...PP...azZ).~..Uj.>..H.b.O..AX.E.S&.O.k.3O'.Lge...$..teI....Hw.CT.].Z.
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:Non-ISO extended-ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):8
                                                            Entropy (8bit):3.0
                                                            Encrypted:false
                                                            SSDEEP:3:xt:r
                                                            MD5:86C3FD2DF4F077CE7DF626236871A2DA
                                                            SHA1:A9D806CBB32A48C33A9952C8737053AB812FB001
                                                            SHA-256:62963D728467DC5A4EB9939347CD3AD8DD33CE67DAF2FCC717F6CEDC98275422
                                                            SHA-512:8F6F3003C597DA58E3886A4226F4004D17FC793B8101C4835D6889F456FAC85DACE8DCF2D6231ECD2CCF75E66C2C4B8E51207852041B29996016AD47BB6037BE
                                                            Malicious:true
                                                            Preview: .6.L...H
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:data
                                                            Category:modified
                                                            Size (bytes):40
                                                            Entropy (8bit):5.153055907333276
                                                            Encrypted:false
                                                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                            MD5:4E5E92E2369688041CC82EF9650EDED2
                                                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                            Malicious:false
                                                            Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):40
                                                            Entropy (8bit):5.153055907333276
                                                            Encrypted:false
                                                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                            MD5:4E5E92E2369688041CC82EF9650EDED2
                                                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                            Malicious:false
                                                            Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                            Process:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):412824
                                                            Entropy (8bit):7.999596596836973
                                                            Encrypted:true
                                                            SSDEEP:12288:8I9gnTsbHFPV7iGQVIB8XBLeMb2qLB1rRxH:8QbHFxB8gMiQRxH
                                                            MD5:C9DF8F232494E30402189920360F0907
                                                            SHA1:F181CE82F56D624408AFD68FE82A6A9D77A23383
                                                            SHA-256:ADA0DF11313089119C94406A8EF300442BC1F42ACFA44DF840F5FA9C732026C3
                                                            SHA-512:541579149843E1C08AEAA60DCC5C379D74D87BD7538B6E84D6476E79A65324BB023DFEE5E44F8BF1E794B94F83E5902FE84F4722CFEED37B1C426B97F4F43769
                                                            Malicious:false
                                                            Preview: FF)d6...0...{..X$.E.v>..'9}G>W.S.K.....(..">b/(..m...d....G1.Fwf..1jr..2.i.K}..,.W....;;..y..U.b.O...1.kb...u...4.]7...D.W..Ci..k.U..+...%..D.[.W..6/......j...w..4p...w...e...v..E...CV'.<....YN.....t2.....p.k..6..[...N.l...Dg..L....O>.H...^..8Kifc....%...yX....e.....y.-O...%.........m_..v..5.A.3.8...A.;.|.3p .yf('..Z.2Sv...Q.&.4...80.h....7u.a..~[....zr.V:cP:f..cy.f....F.b@........Hu.fs.....b...l.V..u...p.p.h.S..'...*?.........5.JMa......s,.<k.bo.V.)<.[R.-.......myP._Y.$...#dS....XN..IE..........Q..w.s`.....<.t.....`.T<.........C.........<..e........p&...F..{. ,nA..".m..$.HD`..:..g.....8...P@/PCxU8>{..............1|_fX......t.:.....X.\..<..._....7u...2.S2Rx...'../.4..0:P...i....DY..].......R....)..0F...M..w..f.....EV.T...v.r..D.K..Yuz \.K+..........y.`...<.!.C...R...C..s:)..=vL..$}6..1...?A(DJ........t..u..xg{.C$8..k.P0..f..D8..g.b..'es....pX..q..[..@32u..1.`.hy.B.*;.c......w.....o...Z.s.d.$.j..!%v..2....{..P...CP.l.X...}w.".\-

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.859478577304115
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:Debitnote-s3update.exe
                                                            File size:701952
                                                            MD5:f162063c8a3c61db87238f88e2e82a81
                                                            SHA1:f8e30f49ca71e8f733774c5bd0f770659bdb93ff
                                                            SHA256:359c0c66cbb2eabf2771a62a2a87762734b73457cf431d1a7e0c94e3a4ab3cfa
                                                            SHA512:c3bcdfc4bfbe63d3a0b1a0cad7a21c28de7948e8c5571dfce21045e2849f1aed931f3df504b8c3adc0ed3d6a1775754fc939b5fa3da752c56d9843f2eed250b3
                                                            SSDEEP:12288:jTq9Ad4zNrL8AuoWBaPXcP9p5YuD1E4qgPJc5e+vzvUxIXN/rN:jTwAGjuoWQclbDDmSmz1/rN
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....|sa..............0.............Z.... ........@.. ....................... ............@................................

                                                            File Icon

                                                            Icon Hash:00828e8e8686b000

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x4aca5a
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x61737CEC [Sat Oct 23 03:09:32 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:v2.0.50727
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                            Entrypoint Preview

                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xaca080x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x5c4.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xaaa600xaac00False0.921517546669data7.86674743084IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xae0000x5c40x600False0.425130208333data4.13412205535IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xb00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_VERSION0xae0900x334data
                                                            RT_MANIFEST0xae3d40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                            Imports

                                                            DLLImport
                                                            mscoree.dll_CorExeMain

                                                            Version Infos

                                                            DescriptionData
                                                            Translation0x0000 0x04b0
                                                            LegalCopyrightCopyright 2017
                                                            Assembly Version1.0.0.0
                                                            InternalNameIAppIdAuthori.exe
                                                            FileVersion1.0.0.0
                                                            CompanyName
                                                            LegalTrademarks
                                                            Comments
                                                            ProductNameGameLibrary
                                                            ProductVersion1.0.0.0
                                                            FileDescriptionGameLibrary
                                                            OriginalFilenameIAppIdAuthori.exe

                                                            Network Behavior

                                                            Snort IDS Alerts

                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            10/25/21-14:45:21.664385TCP2025019ET TROJAN Possible NanoCore C2 60B497561187192.168.2.437.0.10.22
                                                            10/25/21-14:45:30.784967UDP254DNS SPOOF query response with TTL of 1 min. and no authority53580288.8.8.8192.168.2.4
                                                            10/25/21-14:45:31.352807TCP2025019ET TROJAN Possible NanoCore C2 60B497571187192.168.2.437.0.10.22
                                                            10/25/21-14:45:41.180533TCP2025019ET TROJAN Possible NanoCore C2 60B497601187192.168.2.437.0.10.22
                                                            10/25/21-14:45:50.656891TCP2025019ET TROJAN Possible NanoCore C2 60B497611187192.168.2.437.0.10.22
                                                            10/25/21-14:45:55.600682UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499108.8.8.8192.168.2.4
                                                            10/25/21-14:45:55.629398TCP2025019ET TROJAN Possible NanoCore C2 60B497621187192.168.2.437.0.10.22
                                                            10/25/21-14:46:02.293198TCP2025019ET TROJAN Possible NanoCore C2 60B497641187192.168.2.437.0.10.22
                                                            10/25/21-14:46:09.479824TCP2025019ET TROJAN Possible NanoCore C2 60B497651187192.168.2.437.0.10.22
                                                            10/25/21-14:46:16.510060TCP2025019ET TROJAN Possible NanoCore C2 60B497681187192.168.2.437.0.10.22
                                                            10/25/21-14:46:22.739974TCP2025019ET TROJAN Possible NanoCore C2 60B497941187192.168.2.437.0.10.22
                                                            10/25/21-14:46:28.850927TCP2025019ET TROJAN Possible NanoCore C2 60B498111187192.168.2.437.0.10.22
                                                            10/25/21-14:46:34.703543UDP254DNS SPOOF query response with TTL of 1 min. and no authority53496128.8.8.8192.168.2.4
                                                            10/25/21-14:46:34.731419TCP2025019ET TROJAN Possible NanoCore C2 60B498131187192.168.2.437.0.10.22
                                                            10/25/21-14:46:40.633489TCP2025019ET TROJAN Possible NanoCore C2 60B498141187192.168.2.437.0.10.22
                                                            10/25/21-14:46:46.665479UDP254DNS SPOOF query response with TTL of 1 min. and no authority53506018.8.8.8192.168.2.4
                                                            10/25/21-14:46:46.755587TCP2025019ET TROJAN Possible NanoCore C2 60B498151187192.168.2.437.0.10.22
                                                            10/25/21-14:46:52.749851TCP2025019ET TROJAN Possible NanoCore C2 60B498161187192.168.2.437.0.10.22
                                                            10/25/21-14:46:58.651503UDP254DNS SPOOF query response with TTL of 1 min. and no authority53624208.8.8.8192.168.2.4
                                                            10/25/21-14:46:58.683393TCP2025019ET TROJAN Possible NanoCore C2 60B498381187192.168.2.437.0.10.22
                                                            10/25/21-14:47:03.073219TCP2025019ET TROJAN Possible NanoCore C2 60B498461187192.168.2.437.0.10.22
                                                            10/25/21-14:47:08.996250TCP2025019ET TROJAN Possible NanoCore C2 60B498471187192.168.2.437.0.10.22
                                                            10/25/21-14:47:14.911234TCP2025019ET TROJAN Possible NanoCore C2 60B498481187192.168.2.437.0.10.22

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 25, 2021 14:45:21.594652891 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:21.620626926 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:21.620769978 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:21.664385080 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:21.734568119 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:21.734774113 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:21.812038898 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:21.812122107 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:21.838462114 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:21.838607073 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:21.920156956 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:21.972230911 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.044073105 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.044238091 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.123311996 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.124794960 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.204859018 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.208863020 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.285897970 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.287766933 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.291975021 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.292010069 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.292032003 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.292054892 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.292220116 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.293581009 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.319298983 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319334984 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319358110 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319377899 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319399118 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319411039 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.319422007 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319443941 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319447041 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.319466114 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.319473982 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.319520950 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345407009 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345443964 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345468998 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345491886 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345514059 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345520020 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345535994 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345560074 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345561028 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345590115 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345618963 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345634937 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345649004 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345671892 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345674038 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345699072 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345716953 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345722914 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345750093 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345772982 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345802069 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.345865965 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.345875025 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.346009970 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.346689939 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.374025106 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374056101 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374068022 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374080896 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374093056 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374109983 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374121904 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374135017 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374151945 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374165058 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374176979 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374188900 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374201059 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374213934 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374232054 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374248028 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374260902 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374273062 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.374279022 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374299049 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374320030 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374337912 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374356031 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374372959 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374375105 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.374394894 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374414921 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374432087 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374449015 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374465942 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374468088 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.374483109 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374500990 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374519110 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374521017 CEST497561187192.168.2.437.0.10.22
                                                            Oct 25, 2021 14:45:22.374541044 CEST11874975637.0.10.22192.168.2.4
                                                            Oct 25, 2021 14:45:22.374619961 CEST497561187192.168.2.437.0.10.22

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 25, 2021 14:45:21.562231064 CEST4971453192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:45:21.582407951 CEST53497148.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:45:30.758384943 CEST5802853192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:45:30.784966946 CEST53580288.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:45:41.073146105 CEST4925753192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:45:41.091525078 CEST53492578.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:45:50.592943907 CEST6238953192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:45:50.611149073 CEST53623898.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:45:55.578753948 CEST4991053192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:45:55.600682020 CEST53499108.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:02.245498896 CEST6454953192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:02.264076948 CEST53645498.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:09.162899017 CEST6315353192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:09.185523987 CEST53631538.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:16.462050915 CEST5299153192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:16.480628967 CEST53529918.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:22.683264971 CEST5125553192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:22.701802969 CEST53512558.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:28.797502995 CEST5504653192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:28.815942049 CEST53550468.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:34.683144093 CEST4961253192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:34.703542948 CEST53496128.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:40.586491108 CEST4928553192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:40.604971886 CEST53492858.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:46.644082069 CEST5060153192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:46.665478945 CEST53506018.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:52.701982975 CEST5644853192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:52.718069077 CEST53564488.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:46:58.631474972 CEST6242053192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:46:58.651503086 CEST53624208.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:47:03.028523922 CEST6057953192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:47:03.044851065 CEST53605798.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:47:08.946435928 CEST5018353192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:47:08.964937925 CEST53501838.8.8.8192.168.2.4
                                                            Oct 25, 2021 14:47:14.855684996 CEST6153153192.168.2.48.8.8.8
                                                            Oct 25, 2021 14:47:14.874916077 CEST53615318.8.8.8192.168.2.4

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Oct 25, 2021 14:45:21.562231064 CEST192.168.2.48.8.8.80x408cStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:30.758384943 CEST192.168.2.48.8.8.80xd556Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:41.073146105 CEST192.168.2.48.8.8.80xa92dStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:50.592943907 CEST192.168.2.48.8.8.80x2edcStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:55.578753948 CEST192.168.2.48.8.8.80x4e53Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:02.245498896 CEST192.168.2.48.8.8.80x3e61Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:09.162899017 CEST192.168.2.48.8.8.80x646bStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:16.462050915 CEST192.168.2.48.8.8.80x27e5Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:22.683264971 CEST192.168.2.48.8.8.80x53a1Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:28.797502995 CEST192.168.2.48.8.8.80xa00Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:34.683144093 CEST192.168.2.48.8.8.80x9ce5Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:40.586491108 CEST192.168.2.48.8.8.80x1c28Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:46.644082069 CEST192.168.2.48.8.8.80x1ad7Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:52.701982975 CEST192.168.2.48.8.8.80xa1adStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:58.631474972 CEST192.168.2.48.8.8.80xcad7Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:47:03.028523922 CEST192.168.2.48.8.8.80x9b42Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:47:08.946435928 CEST192.168.2.48.8.8.80x9a99Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:47:14.855684996 CEST192.168.2.48.8.8.80x2229Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Oct 25, 2021 14:45:21.582407951 CEST8.8.8.8192.168.2.40x408cNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:30.784966946 CEST8.8.8.8192.168.2.40xd556No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:41.091525078 CEST8.8.8.8192.168.2.40xa92dNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:50.611149073 CEST8.8.8.8192.168.2.40x2edcNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:45:55.600682020 CEST8.8.8.8192.168.2.40x4e53No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:02.264076948 CEST8.8.8.8192.168.2.40x3e61No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:09.185523987 CEST8.8.8.8192.168.2.40x646bNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:16.480628967 CEST8.8.8.8192.168.2.40x27e5No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:22.701802969 CEST8.8.8.8192.168.2.40x53a1No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:28.815942049 CEST8.8.8.8192.168.2.40xa00No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:34.703542948 CEST8.8.8.8192.168.2.40x9ce5No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:40.604971886 CEST8.8.8.8192.168.2.40x1c28No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:46.665478945 CEST8.8.8.8192.168.2.40x1ad7No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:52.718069077 CEST8.8.8.8192.168.2.40xa1adNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:46:58.651503086 CEST8.8.8.8192.168.2.40xcad7No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:47:03.044851065 CEST8.8.8.8192.168.2.40x9b42No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:47:08.964937925 CEST8.8.8.8192.168.2.40x9a99No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 14:47:14.874916077 CEST8.8.8.8192.168.2.40x2229No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:14:45:09
                                                            Start date:25/10/2021
                                                            Path:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\Debitnote-s3update.exe'
                                                            Imagebase:0x2b0000
                                                            File size:701952 bytes
                                                            MD5 hash:F162063C8A3C61DB87238F88E2E82A81
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.689973271.00000000029E2000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.690361863.00000000039C1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.689951422.00000000029C1000.00000004.00000001.sdmp, Author: Joe Security
                                                            Reputation:low

                                                            General

                                                            Start time:14:45:17
                                                            Start date:25/10/2021
                                                            Path:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\Debitnote-s3update.exe
                                                            Imagebase:0xaf0000
                                                            File size:701952 bytes
                                                            MD5 hash:F162063C8A3C61DB87238F88E2E82A81
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000003.698767121.0000000004693000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:14:45:31
                                                            Start date:25/10/2021
                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                            Imagebase:0x5e0000
                                                            File size:701952 bytes
                                                            MD5 hash:F162063C8A3C61DB87238F88E2E82A81
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.730722572.0000000003D11000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.728501904.0000000002D11000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.728551090.0000000002D32000.00000004.00000001.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 58%, ReversingLabs
                                                            Reputation:low

                                                            General

                                                            Start time:14:45:34
                                                            Start date:25/10/2021
                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Imagebase:0x540000
                                                            File size:701952 bytes
                                                            MD5 hash:F162063C8A3C61DB87238F88E2E82A81
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.742502018.0000000002CC1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.740507672.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.742614209.0000000003CC1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >