Loading ...

Play interactive tourEdit tour

Windows Analysis Report CV.exe

Overview

General Information

Sample Name:CV.exe
Analysis ID:508724
MD5:5d9fed85f31d020568f166e6291cbe7b
SHA1:df89b8bfedfd260e648b3a8938b47db6d2e1591c
SHA256:9219aa9982516a8454b770461ed85217cf3adc6c2c2008b296720e3665b51e54
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Contains functionality to detect virtual machines (SLDT)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • CV.exe (PID: 7020 cmdline: 'C:\Users\user\Desktop\CV.exe' MD5: 5D9FED85F31D020568F166E6291CBE7B)
    • CV.exe (PID: 7124 cmdline: C:\Users\user\Desktop\CV.exe MD5: 5D9FED85F31D020568F166E6291CBE7B)
  • dhcpmon.exe (PID: 5512 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 5D9FED85F31D020568F166E6291CBE7B)
    • dhcpmon.exe (PID: 5300 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 5D9FED85F31D020568F166E6291CBE7B)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "baa1bd16-ba50-4743-8b51-41c36ee5", "Group": "Default", "Domain1": "kamuchehddhgfgf.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.453"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x238a7:$a: NanoCore
    • 0x23900:$a: NanoCore
    • 0x2393d:$a: NanoCore
    • 0x239b6:$a: NanoCore
    • 0x23909:$b: ClientPlugin
    • 0x23946:$b: ClientPlugin
    • 0x24244:$b: ClientPlugin
    • 0x24251:$b: ClientPlugin
    • 0x1b100:$e: KeepAlive
    • 0x23d91:$g: LogClientMessage
    • 0x23d11:$i: get_Connected
    • 0x158d9:$j: #=q
    • 0x15909:$j: #=q
    • 0x15945:$j: #=q
    • 0x1596d:$j: #=q
    • 0x1599d:$j: #=q
    • 0x159cd:$j: #=q
    • 0x159fd:$j: #=q
    • 0x15a2d:$j: #=q
    • 0x15a49:$j: #=q
    • 0x15a79:$j: #=q
    00000000.00000002.304747743.0000000003682000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.304713233.0000000003661000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x139c4d:$x1: NanoCore.ClientPluginHost
        • 0x16c46d:$x1: NanoCore.ClientPluginHost
        • 0x139c8a:$x2: IClientNetworkHost
        • 0x16c4aa:$x2: IClientNetworkHost
        • 0x13d7bd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        • 0x16ffdd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 17 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.CV.exe.3667a98.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          5.2.dhcpmon.exe.3e595fe.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe75:$x1: NanoCore.ClientPluginHost
          • 0x145e3:$x1: NanoCore.ClientPluginHost
          • 0x2d0af:$x1: NanoCore.ClientPluginHost
          • 0xe8f:$x2: IClientNetworkHost
          • 0x14610:$x2: IClientNetworkHost
          • 0x2d0dc:$x2: IClientNetworkHost
          5.2.dhcpmon.exe.3e595fe.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xe75:$x2: NanoCore.ClientPluginHost
          • 0x145e3:$x2: NanoCore.ClientPluginHost
          • 0x2d0af:$x2: NanoCore.ClientPluginHost
          • 0x1261:$s3: PipeExists
          • 0x1136:$s4: PipeCreated
          • 0x156be:$s4: PipeCreated
          • 0x2e18a:$s4: PipeCreated
          • 0xeb0:$s5: IClientLoggingHost
          • 0x145fd:$s5: IClientLoggingHost
          • 0x2d0c9:$s5: IClientLoggingHost
          5.2.dhcpmon.exe.3e595fe.3.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            5.2.dhcpmon.exe.3e595fe.3.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
            • 0xddf:$a: NanoCore
            • 0xe38:$a: NanoCore
            • 0xe75:$a: NanoCore
            • 0xeee:$a: NanoCore
            • 0x14599:$a: NanoCore
            • 0x145ae:$a: NanoCore
            • 0x145e3:$a: NanoCore
            • 0x2d065:$a: NanoCore
            • 0x2d07a:$a: NanoCore
            • 0x2d0af:$a: NanoCore
            • 0xe41:$b: ClientPlugin
            • 0xe7e:$b: ClientPlugin
            • 0x177c:$b: ClientPlugin
            • 0x1789:$b: ClientPlugin
            • 0x14355:$b: ClientPlugin
            • 0x14370:$b: ClientPlugin
            • 0x143a0:$b: ClientPlugin
            • 0x145b7:$b: ClientPlugin
            • 0x145ec:$b: ClientPlugin
            • 0x2ce21:$b: ClientPlugin
            • 0x2ce3c:$b: ClientPlugin
            Click to see the 30 entries

            Sigma Overview

            AV Detection:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 7124, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 7124, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 7124, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality:

            barindex
            Sigma detected: NanoCoreShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\CV.exe, ProcessId: 7124, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "baa1bd16-ba50-4743-8b51-41c36ee5", "Group": "Default", "Domain1": "kamuchehddhgfgf.ddns.net", "Port": 1187, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.453"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: CV.exeVirustotal: Detection: 47%Perma Link
            Source: CV.exeReversingLabs: Detection: 55%
            Multi AV Scanner detection for domain / URLShow sources
            Source: kamuchehddhgfgf.ddns.netVirustotal: Detection: 7%Perma Link
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 55%
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTR
            Machine Learning detection for sampleShow sources
            Source: CV.exeJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
            Source: 5.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: CV.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: CV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49742 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49746 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49747 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49748 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49749 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49751 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49779 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49796 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49798 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49799 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49823 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49825 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49827 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49828 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49829 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49830 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49831 -> 37.0.10.22:1187
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49832 -> 37.0.10.22:1187
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs:
            Source: Malware configuration extractorURLs: kamuchehddhgfgf.ddns.net
            Uses dynamic DNS servicesShow sources
            Source: unknownDNS query: name: kamuchehddhgfgf.ddns.net
            Source: Joe Sandbox ViewASN Name: WKD-ASIE WKD-ASIE
            Source: Joe Sandbox ViewIP Address: 37.0.10.22 37.0.10.22
            Source: global trafficTCP traffic: 192.168.2.3:49742 -> 37.0.10.22:1187
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: CV.exe, 00000000.00000003.292840638.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
            Source: CV.exe, 00000000.00000003.292954620.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com.128
            Source: CV.exe, 00000000.00000003.293277635.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coma-eZ~
            Source: CV.exe, 00000000.00000003.292954620.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcmf
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: CV.exe, 00000000.00000003.292793078.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comnL
            Source: CV.exe, 00000000.00000003.293277635.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comt
            Source: CV.exe, 00000000.00000003.292662737.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comva
            Source: CV.exe, 00000000.00000002.306904684.0000000007060000.00000004.00020000.sdmp, dhcpmon.exe, 00000004.00000002.340666656.0000000006A50000.00000004.00020000.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
            Source: CV.exe, 00000000.00000002.305862442.0000000005A9F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.295929510.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: CV.exe, 00000000.00000003.296543987.0000000005A9F000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
            Source: CV.exe, 00000000.00000003.297122363.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comL:
            Source: CV.exe, 00000000.00000002.305862442.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma#:
            Source: CV.exe, 00000000.00000003.297122363.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
            Source: CV.exe, 00000000.00000003.297752818.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcom
            Source: CV.exe, 00000000.00000003.297504963.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
            Source: CV.exe, 00000000.00000003.296469812.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd#:
            Source: CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd9
            Source: CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdW:_L
            Source: CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comepko
            Source: CV.exe, 00000000.00000003.296924212.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comitud
            Source: CV.exe, 00000000.00000003.296001995.0000000005AA1000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comldTF
            Source: CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.commsed
            Source: CV.exe, 00000000.00000003.296543987.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
            Source: CV.exe, 00000000.00000002.305862442.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comrsivo
            Source: CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtota
            Source: CV.exe, 00000000.00000003.300410158.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comue
            Source: CV.exe, 00000000.00000003.295929510.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comzana
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: CV.exe, 00000000.00000003.292056253.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: CV.exe, 00000000.00000003.292194916.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
            Source: CV.exe, 00000000.00000003.292181353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn//
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: CV.exe, 00000000.00000003.292284353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnRL%
            Source: CV.exe, 00000000.00000003.292056253.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cne-d
            Source: CV.exe, 00000000.00000003.292194916.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-nq
            Source: CV.exe, 00000000.00000003.298290141.0000000005A9F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.298024440.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: CV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krm
            Source: CV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kry~
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: CV.exe, 00000000.00000003.294933939.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;:
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/E:IL
            Source: CV.exe, 00000000.00000003.295207535.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/L:
            Source: CV.exe, 00000000.00000003.294709035.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/W:_L
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
            Source: CV.exe, 00000000.00000003.293738034.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/el-g
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/W:_L
            Source: CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/x
            Source: CV.exe, 00000000.00000003.296290237.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.;9
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: CV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr3~_L
            Source: CV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr:~
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: CV.exe, 00000000.00000003.293128361.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com&=
            Source: CV.exe, 00000000.00000003.293128361.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comlic
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: CV.exe, 00000000.00000003.297338037.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
            Source: CV.exe, 00000000.00000003.297307820.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de3=
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: CV.exe, 00000000.00000003.292602258.0000000005A9F000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnva
            Source: unknownDNS traffic detected: queries for: kamuchehddhgfgf.ddns.net
            Source: CV.exe, 00000000.00000002.304284861.00000000016EA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: dhcpmon.exe, 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTR

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.2e33ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: CV.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.2e33ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.2e33ac8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_018E2AA0
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_018E98A8
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_018E3768
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_018E477E
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_018E3778
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB2AA0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB98A8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB36A1
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB3778
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB477E
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB3768
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_04FD2FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_04FD23A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_04FD3850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_04FD306F
            Source: CV.exeBinary or memory string: OriginalFilename vs CV.exe
            Source: CV.exe, 00000000.00000002.306904684.0000000007060000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameTaskNode.dll4 vs CV.exe
            Source: CV.exe, 00000000.00000002.307715323.0000000007240000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll< vs CV.exe
            Source: CV.exe, 00000000.00000002.304284861.00000000016EA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs CV.exe
            Source: CV.exeBinary or memory string: OriginalFilenameSoapInteg.exe8 vs CV.exe
            Source: CV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: dhcpmon.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: CV.exeVirustotal: Detection: 47%
            Source: CV.exeReversingLabs: Detection: 55%
            Source: C:\Users\user\Desktop\CV.exeFile read: C:\Users\user\Desktop\CV.exeJump to behavior
            Source: CV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\CV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\CV.exe 'C:\Users\user\Desktop\CV.exe'
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Source: C:\Users\user\Desktop\CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\CV.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CV.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@6/8@19/2
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\CV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: CV.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
            Source: C:\Users\user\Desktop\CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{baa1bd16-ba50-4743-8b51-41c36ee5d9d4}
            Source: C:\Users\user\Desktop\CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\CV.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: CV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: CV.exe, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.CV.exe.f50000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.CV.exe.f50000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.2.dr, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 2.0.CV.exe.d00000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.2.dhcpmon.exe.740000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.0.dhcpmon.exe.740000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.dhcpmon.exe.770000.1.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.0.dhcpmon.exe.770000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.cs.Net Code: gwijuJnBlDNT8sIbNVv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_00F5A2B7 push es; retf
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2B5D push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2A48 push ecx; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2E1C push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2D11 push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2A01 push edi; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2E3C push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2995 push edi; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2E89 push edi; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_015F2CBC push eax; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_01607276 push ebp; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_016072F6 push ebp; ret
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_018E7FEC pushfd ; iretd
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0074A2B7 push es; retf
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2CBC push eax; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2E89 push edi; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2A48 push ecx; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2E3C push eax; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2E1C push eax; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2A01 push edi; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2995 push edi; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2B5D push eax; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FE2D11 push eax; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00FF7324 push ebp; ret
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_04FB7FEC pushfd ; iretd
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 5_2_0077A2B7 push es; retf
            Source: initial sampleStatic PE information: section name: .text entropy: 7.82329709284
            Source: initial sampleStatic PE information: section name: .text entropy: 7.82329709284
            Source: CV.exe, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: CV.exe, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: CV.exe, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: CV.exe, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: CV.exe, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: CV.exe, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: CV.exe, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: CV.exe, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: CV.exe, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 0.0.CV.exe.f50000.0.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 0.0.CV.exe.f50000.0.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 0.0.CV.exe.f50000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 0.0.CV.exe.f50000.0.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 0.0.CV.exe.f50000.0.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 0.0.CV.exe.f50000.0.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 0.0.CV.exe.f50000.0.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 0.0.CV.exe.f50000.0.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 0.0.CV.exe.f50000.0.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 0.2.CV.exe.f50000.0.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 0.2.CV.exe.f50000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 0.2.CV.exe.f50000.0.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 0.2.CV.exe.f50000.0.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 0.2.CV.exe.f50000.0.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 0.2.CV.exe.f50000.0.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 0.2.CV.exe.f50000.0.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 0.2.CV.exe.f50000.0.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 0.2.CV.exe.f50000.0.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: dhcpmon.exe.2.dr, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: dhcpmon.exe.2.dr, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: dhcpmon.exe.2.dr, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: dhcpmon.exe.2.dr, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: dhcpmon.exe.2.dr, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: dhcpmon.exe.2.dr, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: dhcpmon.exe.2.dr, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: dhcpmon.exe.2.dr, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: dhcpmon.exe.2.dr, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 2.0.CV.exe.d00000.0.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 2.0.CV.exe.d00000.0.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 2.0.CV.exe.d00000.0.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 2.0.CV.exe.d00000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 2.0.CV.exe.d00000.0.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 2.0.CV.exe.d00000.0.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 2.0.CV.exe.d00000.0.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 2.0.CV.exe.d00000.0.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 2.0.CV.exe.d00000.0.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 4.2.dhcpmon.exe.740000.0.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 4.0.dhcpmon.exe.740000.0.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 5.2.dhcpmon.exe.770000.1.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, GQ9WpnkMxs0KqDlR2p/hrvUB6q5ehponiZHtm.csHigh entropy of concatenated method names: 'M17iAmQZ1V', 'j1WicCThhc', 'Kb3iTBHgep', 'XcdiVebSVE', 'MUmi6I4X8E', 'cJDiK0k8Yi', 'N9mik5naKE', 'ooAibx7mwa', 'y5siH3cVsD', '.ctor'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, U0GjgnuvPsJiWrBfdd/MwQiV9lNrqbX6gLeoM.csHigh entropy of concatenated method names: 'giBAHmpOI', 'eixCfSdgg', 'Hu7ccixbJ', 'F8VyeymWy', 'MhYTifPTu', 'ttAFgIyRt', 'iQbVN2RNq', 'iejXRitWZ', 'XD26EtWqg', '.ctor'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, vcv4gTirOXWUkhhGZm/fYdeSiOhGUYAVaiNf9.csHigh entropy of concatenated method names: 'yktEoc6Ya', 'vp8GK43Tk', '.ctor', 'pi5jGds9i', 'MIp8JqFYj', 'WorR2O6aV', 'fFsN5mp8Q', 'O25QpMydK', 'JmanyLpuf', 'EvoetO72G'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, JQbqyjgMb1J9JIpJyU/XmgRAB8YhhVrmAJ6e1.csHigh entropy of concatenated method names: 'QVHtOtpxWt', 'IjYtUAIfW3', 'dg6thZoKcT', 'Pgbt4CDBeI', 'ctmt32W6j4', 'PwktgiAtIE', 'MSIt7BQ8dp', '.ctor', 'wHYWQG4A9C', 'XyQtH8GZL3'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, f6QAEQbHVikhcusZIE/HbdsvqV4QrR2Zn1T7w.csHigh entropy of concatenated method names: 'DnMWKmdpDu', 'a3VWP3DBHf', 'aFSWDshvec', 'haPWbRSHhe', '.ctor', 'ttAWsgIyRt', 'HXgdpsnvRLiqam5ZlhJ', 'G1kZYonsMH5qr0RLhC7', 'K3EI4LniTKoHXiZcPvE', 'OQ4plNnqKOHpGiLTKtf'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, EVbGiUaRXQ4q1l90m3/d2W5DtpYMHJygNb8sb.csHigh entropy of concatenated method names: 'xXGLROtEm', 'Ho2OkMFJ5', 'Rn7YDwpDI', 'FQ2hhR32S', '.ctor', 'TenbtQVjV', 'GJdH1Evjd', 'p0j1eMo6A', 'arxWNXpJhl', 'x4suC6YPS'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, J17pUYxA9GWZaQcuSR/a64q056RtKseix88WN.csHigh entropy of concatenated method names: 'arxiXpJhl', 'HTxVrK5kMmDmJUOZdp', 'FlaVtKk3jkCs0QrrHO', 'h6QvH19VxAW3lH63Fs', 'egFcgTyP4p9ScIm9Om', 'ep0wcc1wwFEBomZ9Ir', 'ji8kXxI03MCuXIyq4G', 'jNB6fXu3bLsbIjkBNr'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, GR4yJPQDWUbch0SaCW/maOSCjS5dWe2tt79WY.csHigh entropy of concatenated method names: '.ctor', 'LRciz3RqpG', 'IQntdU0WOy', 'Dispose', 'JDvtisw55s', 'VMLttCxOni', 'M6fLCIbs97jpZ6LrdCK', 'dgRbUAb7rviXDimUBM1', 'OlXjaJbvJXNXKUSnH4y', 'bT0rYVbid7xUJw9U33E'
            Source: 5.0.dhcpmon.exe.770000.0.unpack, zbO3yM9XlRkXc1UhgG/AstOoPcs4y7n999nUR.csHigh entropy of concatenated method names: 'Q81ijORQV0', 'mrEi8j5gIO', 'oWSiNCQ0OB', 'CAZiQ4fUdW', '.ctor', 'LcqWnjPeaR', 'ToString', 'LxyiGEF3N3', 'M2je8SbS0mSg54i8xWw', 'u4rNc0b68lNTiTSpRZW'
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 5.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: C:\Users\user\Desktop\CV.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\Desktop\CV.exeFile opened: C:\Users\user\Desktop\CV.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\CV.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 0.2.CV.exe.3667a98.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.2e77ad8.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.304747743.0000000003682000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.304713233.0000000003661000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.337007727.0000000002E92000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CV.exe PID: 7020, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5512, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: CV.exe, 00000000.00000002.304747743.0000000003682000.00000004.00000001.sdmp, dhcpmon.exe, 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: CV.exe, 00000000.00000002.304747743.0000000003682000.00000004.00000001.sdmp, dhcpmon.exe, 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\CV.exe TID: 7024Thread sleep time: -33317s >= -30000s
            Source: C:\Users\user\Desktop\CV.exe TID: 7064Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\CV.exe TID: 5728Thread sleep time: -1844674407370954s >= -30000s
            Source: C:\Users\user\Desktop\CV.exe TID: 5728Thread sleep count: 217 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 5728Thread sleep count: 242 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 5728Thread sleep count: 52 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 5728Thread sleep count: 65 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 4620Thread sleep count: 48 > 30
            Source: C:\Users\user\Desktop\CV.exe TID: 4620Thread sleep time: -960000s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5708Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6240Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\CV.exeWindow / User API: foregroundWindowGot 589
            Source: C:\Users\user\Desktop\CV.exeWindow / User API: foregroundWindowGot 621
            Source: C:\Users\user\Desktop\CV.exeCode function: 0_2_016072F6 sldt word ptr [eax]
            Source: C:\Users\user\Desktop\CV.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 33317
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\CV.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: dhcpmon.exe, 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
            Source: dhcpmon.exe, 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: dhcpmon.exe, 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: CV.exe, 00000002.00000003.313699817.00000000014E9000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: dhcpmon.exe, 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\CV.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\CV.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\CV.exeMemory written: C:\Users\user\Desktop\CV.exe base: 400000 value starts with: 4D5A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\CV.exeProcess created: C:\Users\user\Desktop\CV.exe C:\Users\user\Desktop\CV.exe
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            Source: CV.exe, 00000002.00000003.433434885.0000000001542000.00000004.00000001.sdmpBinary or memory string: Program Managerter2
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
            Source: C:\Users\user\Desktop\CV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

            Stealing of Sensitive Information:

            barindex
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Detected Nanocore RatShow sources
            Source: dhcpmon.exe, 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Yara detected Nanocore RATShow sources
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e595fe.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e62a5d.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.3e5e434.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.CV.exe.478aac0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.3f9aac0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5300, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection112Masquerading2Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            CV.exe47%VirustotalBrowse
            CV.exe56%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            CV.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe56%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            5.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

            Domains

            SourceDetectionScannerLabelLink
            kamuchehddhgfgf.ddns.net8%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            0%Avira URL Cloudsafe
            http://www.fontbureau.comd#:0%Avira URL Cloudsafe
            http://www.fontbureau.comdW:_L0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.fontbureau.comd90%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/jp/W:_L0%Avira URL Cloudsafe
            http://www.carterandcone.comva0%URL Reputationsafe
            http://www.fontbureau.commsed0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/el-g0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.fontbureau.comepko0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.urwpp.de3=0%Avira URL Cloudsafe
            http://www.carterandcone.com0%URL Reputationsafe
            http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe
            http://www.carterandcone.comcmf0%Avira URL Cloudsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.carterandcone.com.1280%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.carterandcone.coma-eZ~0%Avira URL Cloudsafe
            http://www.fontbureau.comtota0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
            http://www.sandoll.co.kr3~_L0%Avira URL Cloudsafe
            http://www.fontbureau.comcom0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/L:0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/E:IL0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/W:_L0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.tiro.com&=0%Avira URL Cloudsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.goodfont.co.krm0%Avira URL Cloudsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.carterandcone.comnL0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.fontbureau.comue0%URL Reputationsafe
            http://www.fontbureau.comF0%URL Reputationsafe
            http://www.fontbureau.coma#:0%Avira URL Cloudsafe
            kamuchehddhgfgf.ddns.net0%Avira URL Cloudsafe
            http://www.sandoll.co.kr:~0%Avira URL Cloudsafe
            http://www.tiro.comlic0%URL Reputationsafe
            http://www.fontbureau.comzana0%Avira URL Cloudsafe
            http://www.carterandcone.comt0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/;:0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.fontbureau.comd0%URL Reputationsafe
            http://www.goodfont.co.kry~0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.founder.com.cn/cnRL%0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
            http://www.zhongyicts.com.cnva0%URL Reputationsafe
            http://www.fontbureau.comL:0%Avira URL Cloudsafe
            http://www.fontbureau.comldTF0%Avira URL Cloudsafe
            http://www.founder.com.cn/cne-d0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fontbureau.como0%URL Reputationsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.fontbureau.comitud0%URL Reputationsafe
            http://www.fontbureau.comrsivo0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn//0%Avira URL Cloudsafe
            http://www.monotype.;90%Avira URL Cloudsafe
            http://www.founder.com.cn/cnl-nq0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            kamuchehddhgfgf.ddns.net
            37.0.10.22
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            true
            • Avira URL Cloud: safe
            low
            kamuchehddhgfgf.ddns.nettrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.fontbureau.comd#:CV.exe, 00000000.00000003.296469812.0000000005A9F000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designersGCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.comdW:_LCV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.fontbureau.com/designers/?CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                high
                http://www.founder.com.cn/cn/bTheCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.comd9CV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/jp/W:_LCV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.carterandcone.comvaCV.exe, 00000000.00000003.292662737.0000000005A9F000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.commsedCV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/el-gCV.exe, 00000000.00000003.293738034.0000000005A9F000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.comCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comepkoCV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.de3=CV.exe, 00000000.00000003.297307820.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.carterandcone.comCV.exe, 00000000.00000003.292840638.0000000005A9F000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.collada.org/2005/11/COLLADASchema9DoneCV.exe, 00000000.00000002.306904684.0000000007060000.00000004.00020000.sdmp, dhcpmon.exe, 00000004.00000002.340666656.0000000006A50000.00000004.00020000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comcmfCV.exe, 00000000.00000003.292954620.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.comCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.com.128CV.exe, 00000000.00000003.292954620.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.founder.com.cn/cn/cTheCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.coma-eZ~CV.exe, 00000000.00000003.293277635.0000000005A7C000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.comtotaCV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp//CV.exe, 00000000.00000003.294933939.0000000005A9F000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.kr3~_LCV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.comcomCV.exe, 00000000.00000003.297752818.0000000005A9F000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/L:CV.exe, 00000000.00000003.295207535.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/E:ILCV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/W:_LCV.exe, 00000000.00000003.294709035.0000000005A9F000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Y0CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fonts.comCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                      high
                      http://www.sandoll.co.krCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.com&=CV.exe, 00000000.00000003.293128361.0000000005A9F000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.urwpp.deDPleaseCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.goodfont.co.krmCV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.urwpp.deCV.exe, 00000000.00000003.297338037.0000000005A9F000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sakkal.comCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comnLCV.exe, 00000000.00000003.292793078.0000000005A9F000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comCV.exe, 00000000.00000002.305862442.0000000005A9F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.295929510.0000000005A9F000.00000004.00000001.sdmpfalse
                          high
                          http://www.galapagosdesign.com/CV.exe, 00000000.00000003.298290141.0000000005A9F000.00000004.00000001.sdmp, CV.exe, 00000000.00000003.298024440.0000000005A9F000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comueCV.exe, 00000000.00000003.300410158.0000000005A9F000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comFCV.exe, 00000000.00000003.296688420.0000000005A9F000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.coma#:CV.exe, 00000000.00000002.305862442.0000000005A9F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sandoll.co.kr:~CV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.tiro.comlicCV.exe, 00000000.00000003.293128361.0000000005A9F000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comzanaCV.exe, 00000000.00000003.295929510.0000000005A9F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comtCV.exe, 00000000.00000003.293277635.0000000005A7C000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/;:CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comdCV.exe, 00000000.00000003.297504963.0000000005A9F000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.goodfont.co.kry~CV.exe, 00000000.00000003.291507105.0000000005A7C000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.carterandcone.comlCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnRL%CV.exe, 00000000.00000003.292284353.0000000005A9F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cn/CV.exe, 00000000.00000003.292194916.0000000005A7C000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNCV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cnCV.exe, 00000000.00000003.292056253.0000000005A9F000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/xCV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlCV.exe, 00000000.00000003.296543987.0000000005A9F000.00000004.00000001.sdmp, CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                              high
                              http://www.zhongyicts.com.cnvaCV.exe, 00000000.00000003.292602258.0000000005A9F000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comL:CV.exe, 00000000.00000003.297122363.0000000005A9F000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comldTFCV.exe, 00000000.00000003.296001995.0000000005AA1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cne-dCV.exe, 00000000.00000003.292056253.0000000005A9F000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/CV.exe, 00000000.00000003.294520353.0000000005A9F000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comoCV.exe, 00000000.00000003.296543987.0000000005A9F000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8CV.exe, 00000000.00000002.305939020.0000000006C82000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comalsCV.exe, 00000000.00000003.297122363.0000000005A9F000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comitudCV.exe, 00000000.00000003.296924212.0000000005A9F000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comrsivoCV.exe, 00000000.00000002.305862442.0000000005A9F000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn//CV.exe, 00000000.00000003.292181353.0000000005A9F000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.monotype.;9CV.exe, 00000000.00000003.296290237.0000000005A9F000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.founder.com.cn/cnl-nqCV.exe, 00000000.00000003.292194916.0000000005A7C000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                37.0.10.22
                                kamuchehddhgfgf.ddns.netNetherlands
                                198301WKD-ASIEtrue

                                Private

                                IP
                                192.168.2.1

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:508724
                                Start date:25.10.2021
                                Start time:14:59:11
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 11m 21s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:CV.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:19
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@6/8@19/2
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 2.7% (good quality ratio 1.7%)
                                • Quality average: 54%
                                • Quality standard deviation: 42.8%
                                HCA Information:
                                • Successful, ratio: 97%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                • TCP Packets have been reduced to 100
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 20.82.209.183, 93.184.221.240, 40.91.112.76, 40.112.88.60, 20.54.110.249, 80.67.82.211, 80.67.82.235, 20.50.102.62
                                • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, a1449.dscg2.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, wu.azureedge.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                15:00:13API Interceptor950x Sleep call for process: CV.exe modified
                                15:00:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                15:00:27API Interceptor1x Sleep call for process: dhcpmon.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                37.0.10.22Debitnote-s3update.exeGet hashmaliciousBrowse
                                  Purchase Order.exeGet hashmaliciousBrowse
                                    Order.exeGet hashmaliciousBrowse
                                      Order.exeGet hashmaliciousBrowse
                                        My CV.exeGet hashmaliciousBrowse
                                          Quote.exeGet hashmaliciousBrowse
                                            Invoice and waybill.exeGet hashmaliciousBrowse
                                              My Resume.exeGet hashmaliciousBrowse
                                                Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                  Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                    Balance Payment.exeGet hashmaliciousBrowse
                                                      PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                        Circular PSSB Parts Disc Credit Term (Dlr) s.exeGet hashmaliciousBrowse
                                                          T.T.exeGet hashmaliciousBrowse

                                                            Domains

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            kamuchehddhgfgf.ddns.netDebitnote-s3update.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            My CV.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Quote.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Invoice and waybill.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            My Resume.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Circular PSSB Parts Disc Credit Term (Dlr) Oct2021 (1).exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Balance Payment.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Circular PSSB Parts Disc Credit Term (Dlr) s.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            T.T.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22

                                                            ASN

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            WKD-ASIEDebitnote-s3update.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            SKypfeGItc.exeGet hashmaliciousBrowse
                                                            • 37.0.10.190
                                                            Purchase Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            HBC.exeGet hashmaliciousBrowse
                                                            • 37.0.10.15
                                                            85QKQNr7mm.xlsxGet hashmaliciousBrowse
                                                            • 37.0.10.15
                                                            AB948F038175411DC326A1AAD83DF48D6B65632501551.exeGet hashmaliciousBrowse
                                                            • 37.0.8.235
                                                            FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exeGet hashmaliciousBrowse
                                                            • 37.0.10.214
                                                            3qZB2fO4lG.exeGet hashmaliciousBrowse
                                                            • 37.0.8.193
                                                            365F984ABE68DDD398D7B749FB0E69B0F29DAF86F0E3E.exeGet hashmaliciousBrowse
                                                            • 37.0.11.8
                                                            CQUOTATION REQUEST4.scr.exeGet hashmaliciousBrowse
                                                            • 37.0.10.252
                                                            gy6JsH7kJx.exeGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            About company.docGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            SecuriteInfo.com.Virus.Win32.Save.a.26327.exeGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            ifCgoV9Ykq.exeGet hashmaliciousBrowse
                                                            • 37.0.10.225
                                                            Agent_UDPRat.exeGet hashmaliciousBrowse
                                                            • 37.0.11.171
                                                            Agent_UDPRat.exeGet hashmaliciousBrowse
                                                            • 37.0.11.171
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            Order.exeGet hashmaliciousBrowse
                                                            • 37.0.10.22
                                                            download.dat.exeGet hashmaliciousBrowse
                                                            • 37.0.10.13
                                                            TA9015--AA-TA9015-000786-AA-TA9015--AA-TA9015.exeGet hashmaliciousBrowse
                                                            • 37.0.10.13

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):707072
                                                            Entropy (8bit):7.8156615612969675
                                                            Encrypted:false
                                                            SSDEEP:12288:iezTgmd4aCmp+SKpmH/dUytftIVyH7/i9flZ0IU3oEgUBFeg4XWq5m:iezTgmyjqfSM763t4gUBIg4v
                                                            MD5:5D9FED85F31D020568F166E6291CBE7B
                                                            SHA1:DF89B8BFEDFD260E648B3A8938B47DB6D2E1591C
                                                            SHA-256:9219AA9982516A8454B770461ED85217CF3ADC6C2C2008B296720E3665B51E54
                                                            SHA-512:0EB7B60FBBAACF29E0DDC98B776C50E5395214F75E048D61A6739C4552CD301E10CA8CC361E23762CAACFD07EBFD99058C302B5849FA7585D14614BAF3968638
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 56%
                                                            Reputation:low
                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.ua................................. ........@.. ....................... ............@.....................................K.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............Z..........@................................................0..........+.&. ....8U.......X. .....:D...&..(.... ....(....:-...&.. ....(....:....&...(....8>... ............E....................Y...........z...&...B...s...8u...& ....8......(....?+... ....8.........(....9....& .....9....&8......(..... ....8v...(..... ....(.... ....8\....*...J+.&.........o....*.>+.&......(....*:+.&.....o....*..+.&..(....*>+.&......(....*.+.&..*..+.&..*..0..........+.&..~......eo......
                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: [ZoneTransfer]....ZoneId=0
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CV.exe.log
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):525
                                                            Entropy (8bit):5.2874233355119316
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                            MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):525
                                                            Entropy (8bit):5.2874233355119316
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                            MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:data
                                                            Category:modified
                                                            Size (bytes):232
                                                            Entropy (8bit):7.117516745217376
                                                            Encrypted:false
                                                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7V9Nhyleajl0fuONKcpMe5i:X4LEnybgCFCtvd7V9NYRj+GONKaMv
                                                            MD5:CF55DF705B79F961ED069D8E84D2AF1C
                                                            SHA1:574CDF36753CF356A25872BCCAA3CC6FFCD5D23F
                                                            SHA-256:DF982E10764D21FCB1469EB6EA1175AC69544C68900B0DD8C79A0FE8A8F300F5
                                                            SHA-512:518A037DF1D6FBC8A296DA5B96B67E073FB1F674090AFE3243E52A65B169DE35FC041C2C05F7EEF9EC74A0100A422E53B3D7D920E5ADF6CE42B82FE94244F5DE
                                                            Malicious:false
                                                            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL...Q.F...@.h.......y.[....e..<..n....B...PP...azZ).~..Uj.>..H.b.O..AX.E.S&.O.k.3O'.Lge...$..teI....Hw.CT.].Z.
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):8
                                                            Entropy (8bit):3.0
                                                            Encrypted:false
                                                            SSDEEP:3:T8n:Yn
                                                            MD5:8B8C880350695864DF354F28F60894FD
                                                            SHA1:0563D4B83527F6EAFB265CDABB8DF7DA25585E9B
                                                            SHA-256:D1C3BC8F732DCA9A6C11BED615E42B2894AE6A626A70A0F521F82C5AB9291B5A
                                                            SHA-512:ED162076CFF8CCEEE591FCC76EC298EF54B075D15CCB4A938C567DDD317EBCE968797ABDCE5B7288CCD57105DD112E950ECA82AA2DAE781BBFA153D63BC2B563
                                                            Malicious:true
                                                            Preview: ..8....H
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):40
                                                            Entropy (8bit):5.153055907333276
                                                            Encrypted:false
                                                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                            MD5:4E5E92E2369688041CC82EF9650EDED2
                                                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                            Malicious:false
                                                            Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                            Process:C:\Users\user\Desktop\CV.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):412824
                                                            Entropy (8bit):7.999596596836973
                                                            Encrypted:true
                                                            SSDEEP:12288:8I9gnTsbHFPV7iGQVIB8XBLeMb2qLB1rRxH:8QbHFxB8gMiQRxH
                                                            MD5:C9DF8F232494E30402189920360F0907
                                                            SHA1:F181CE82F56D624408AFD68FE82A6A9D77A23383
                                                            SHA-256:ADA0DF11313089119C94406A8EF300442BC1F42ACFA44DF840F5FA9C732026C3
                                                            SHA-512:541579149843E1C08AEAA60DCC5C379D74D87BD7538B6E84D6476E79A65324BB023DFEE5E44F8BF1E794B94F83E5902FE84F4722CFEED37B1C426B97F4F43769
                                                            Malicious:false
                                                            Preview: FF)d6...0...{..X$.E.v>..'9}G>W.S.K.....(..">b/(..m...d....G1.Fwf..1jr..2.i.K}..,.W....;;..y..U.b.O...1.kb...u...4.]7...D.W..Ci..k.U..+...%..D.[.W..6/......j...w..4p...w...e...v..E...CV'.<....YN.....t2.....p.k..6..[...N.l...Dg..L....O>.H...^..8Kifc....%...yX....e.....y.-O...%.........m_..v..5.A.3.8...A.;.|.3p .yf('..Z.2Sv...Q.&.4...80.h....7u.a..~[....zr.V:cP:f..cy.f....F.b@........Hu.fs.....b...l.V..u...p.p.h.S..'...*?.........5.JMa......s,.<k.bo.V.)<.[R.-.......myP._Y.$...#dS....XN..IE..........Q..w.s`.....<.t.....`.T<.........C.........<..e........p&...F..{. ,nA..".m..$.HD`..:..g.....8...P@/PCxU8>{..............1|_fX......t.:.....X.\..<..._....7u...2.S2Rx...'../.4..0:P...i....DY..].......R....)..0F...M..w..f.....EV.T...v.r..D.K..Yuz \.K+..........y.`...<.!.C...R...C..s:)..=vL..$}6..1...?A(DJ........t..u..xg{.C$8..k.P0..f..D8..g.b..'es....pX..q..[..@32u..1.`.hy.B.*;.c......w.....o...Z.s.d.$.j..!%v..2....{..P...CP.l.X...}w.".\-

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.8156615612969675
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                            • Win32 Executable (generic) a (10002005/4) 49.97%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:CV.exe
                                                            File size:707072
                                                            MD5:5d9fed85f31d020568f166e6291cbe7b
                                                            SHA1:df89b8bfedfd260e648b3a8938b47db6d2e1591c
                                                            SHA256:9219aa9982516a8454b770461ed85217cf3adc6c2c2008b296720e3665b51e54
                                                            SHA512:0eb7b60fbbaacf29e0ddc98b776c50e5395214f75e048d61a6739c4552cd301e10ca8cc361e23762caacfd07ebfd99058c302b5849fa7585d14614baf3968638
                                                            SSDEEP:12288:iezTgmd4aCmp+SKpmH/dUytftIVyH7/i9flZ0IU3oEgUBFeg4XWq5m:iezTgmyjqfSM763t4gUBIg4v
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.ua................................. ........@.. ....................... ............@................................

                                                            File Icon

                                                            Icon Hash:00828e8e8686b000

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x4ade1e
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x61750C30 [Sun Oct 24 07:33:04 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:v2.0.50727
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                            Entrypoint Preview

                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xaddd00x4b.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x5b0.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xabe240xac000False0.90768929415data7.82329709284IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xae0000x5b00x600False0.423828125data4.09943837938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xb00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_VERSION0xae0a00x324data
                                                            RT_MANIFEST0xae3c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                            Imports

                                                            DLLImport
                                                            mscoree.dll_CorExeMain

                                                            Version Infos

                                                            DescriptionData
                                                            Translation0x0000 0x04b0
                                                            LegalCopyrightCopyright 2017
                                                            Assembly Version1.0.0.0
                                                            InternalNameSoapInteg.exe
                                                            FileVersion1.0.0.0
                                                            CompanyName
                                                            LegalTrademarks
                                                            Comments
                                                            ProductNameGameLibrary
                                                            ProductVersion1.0.0.0
                                                            FileDescriptionGameLibrary
                                                            OriginalFilenameSoapInteg.exe

                                                            Network Behavior

                                                            Snort IDS Alerts

                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            10/25/21-15:00:18.610143UDP254DNS SPOOF query response with TTL of 1 min. and no authority53580458.8.8.8192.168.2.3
                                                            10/25/21-15:00:18.836746TCP2025019ET TROJAN Possible NanoCore C2 60B497421187192.168.2.337.0.10.22
                                                            10/25/21-15:00:25.286725UDP254DNS SPOOF query response with TTL of 1 min. and no authority53574598.8.8.8192.168.2.3
                                                            10/25/21-15:00:25.447598TCP2025019ET TROJAN Possible NanoCore C2 60B497431187192.168.2.337.0.10.22
                                                            10/25/21-15:00:33.199758UDP254DNS SPOOF query response with TTL of 1 min. and no authority53541548.8.8.8192.168.2.3
                                                            10/25/21-15:00:33.229011TCP2025019ET TROJAN Possible NanoCore C2 60B497461187192.168.2.337.0.10.22
                                                            10/25/21-15:00:39.800881TCP2025019ET TROJAN Possible NanoCore C2 60B497471187192.168.2.337.0.10.22
                                                            10/25/21-15:00:46.409065TCP2025019ET TROJAN Possible NanoCore C2 60B497481187192.168.2.337.0.10.22
                                                            10/25/21-15:00:52.973691UDP254DNS SPOOF query response with TTL of 1 min. and no authority53640218.8.8.8192.168.2.3
                                                            10/25/21-15:00:53.003769TCP2025019ET TROJAN Possible NanoCore C2 60B497491187192.168.2.337.0.10.22
                                                            10/25/21-15:00:59.564035TCP2025019ET TROJAN Possible NanoCore C2 60B497511187192.168.2.337.0.10.22
                                                            10/25/21-15:01:06.817041TCP2025019ET TROJAN Possible NanoCore C2 60B497791187192.168.2.337.0.10.22
                                                            10/25/21-15:01:13.608793TCP2025019ET TROJAN Possible NanoCore C2 60B497961187192.168.2.337.0.10.22
                                                            10/25/21-15:01:20.781475TCP2025019ET TROJAN Possible NanoCore C2 60B497981187192.168.2.337.0.10.22
                                                            10/25/21-15:01:26.772400UDP254DNS SPOOF query response with TTL of 1 min. and no authority53571068.8.8.8192.168.2.3
                                                            10/25/21-15:01:26.800869TCP2025019ET TROJAN Possible NanoCore C2 60B497991187192.168.2.337.0.10.22
                                                            10/25/21-15:01:32.852409TCP2025019ET TROJAN Possible NanoCore C2 60B498231187192.168.2.337.0.10.22
                                                            10/25/21-15:01:38.827127TCP2025019ET TROJAN Possible NanoCore C2 60B498251187192.168.2.337.0.10.22
                                                            10/25/21-15:01:44.740049UDP254DNS SPOOF query response with TTL of 1 min. and no authority53580588.8.8.8192.168.2.3
                                                            10/25/21-15:01:44.771272TCP2025019ET TROJAN Possible NanoCore C2 60B498271187192.168.2.337.0.10.22
                                                            10/25/21-15:01:50.676956TCP2025019ET TROJAN Possible NanoCore C2 60B498281187192.168.2.337.0.10.22
                                                            10/25/21-15:01:56.589707UDP254DNS SPOOF query response with TTL of 1 min. and no authority53515398.8.8.8192.168.2.3
                                                            10/25/21-15:01:56.626994TCP2025019ET TROJAN Possible NanoCore C2 60B498291187192.168.2.337.0.10.22
                                                            10/25/21-15:02:02.535309UDP254DNS SPOOF query response with TTL of 1 min. and no authority53553938.8.8.8192.168.2.3
                                                            10/25/21-15:02:02.564431TCP2025019ET TROJAN Possible NanoCore C2 60B498301187192.168.2.337.0.10.22
                                                            10/25/21-15:02:08.926314TCP2025019ET TROJAN Possible NanoCore C2 60B498311187192.168.2.337.0.10.22
                                                            10/25/21-15:02:14.881863UDP254DNS SPOOF query response with TTL of 1 min. and no authority53634568.8.8.8192.168.2.3
                                                            10/25/21-15:02:14.920037TCP2025019ET TROJAN Possible NanoCore C2 60B498321187192.168.2.337.0.10.22

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 25, 2021 15:00:18.739182949 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:18.771181107 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:18.771404028 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:18.836745977 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:18.905957937 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:18.906229973 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:18.984297991 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:18.984508038 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.011850119 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.063054085 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.094949961 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.174009085 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.174232006 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.253910065 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.254120111 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.329642057 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.329839945 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.408052921 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.408093929 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.408116102 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.408143044 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.408190012 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.408242941 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.434498072 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434539080 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434565067 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434588909 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434612989 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434642076 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434653044 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434681892 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.434689045 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.434742928 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.461292028 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461327076 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461344957 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461369991 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461391926 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461427927 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461437941 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461456060 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461479902 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461503983 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461527109 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461551905 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461575031 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461596966 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461621046 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.461745977 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.461819887 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.487977028 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488017082 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488039970 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488063097 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488086939 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488104105 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488126993 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488148928 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488171101 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488192081 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488214970 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488238096 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488265038 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488293886 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488306999 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488332033 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488374949 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.488480091 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.488879919 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488909006 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488930941 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488955021 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.488977909 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.489003897 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.489031076 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.489104986 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.501518965 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519057989 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519098997 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519139051 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519155979 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519164085 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519187927 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519210100 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519211054 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519234896 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519237041 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519260883 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519282103 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519285917 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519310951 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519314051 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519335032 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519345045 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519359112 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519371986 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519382954 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519404888 CEST497421187192.168.2.337.0.10.22
                                                            Oct 25, 2021 15:00:19.519404888 CEST11874974237.0.10.22192.168.2.3
                                                            Oct 25, 2021 15:00:19.519429922 CEST11874974237.0.10.22192.168.2.3

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 25, 2021 15:00:18.588891983 CEST5804553192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:18.610142946 CEST53580458.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:00:25.265844107 CEST5745953192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:25.286725044 CEST53574598.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:00:33.179090977 CEST5415453192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:33.199758053 CEST53541548.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:00:39.739573956 CEST5280653192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:39.756234884 CEST53528068.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:00:46.357811928 CEST5391053192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:46.376326084 CEST53539108.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:00:52.953521967 CEST6402153192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:52.973690987 CEST53640218.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:00:59.429028988 CEST5114353192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:00:59.446767092 CEST53511438.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:06.766701937 CEST4955953192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:06.785360098 CEST53495598.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:13.559650898 CEST5072853192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:13.577939034 CEST53507288.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:20.732178926 CEST5377753192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:20.750567913 CEST53537778.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:26.752331018 CEST5710653192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:26.772399902 CEST53571068.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:32.805299044 CEST6035253192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:32.823734999 CEST53603528.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:38.778913975 CEST5677353192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:38.797635078 CEST53567738.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:44.719530106 CEST5805853192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:44.740048885 CEST53580588.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:50.603530884 CEST6436753192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:50.622005939 CEST53643678.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:01:56.568674088 CEST5153953192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:01:56.589706898 CEST53515398.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:02:02.515014887 CEST5539353192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:02:02.535309076 CEST53553938.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:02:08.877588034 CEST5058553192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:02:08.895885944 CEST53505858.8.8.8192.168.2.3
                                                            Oct 25, 2021 15:02:14.861913919 CEST6345653192.168.2.38.8.8.8
                                                            Oct 25, 2021 15:02:14.881863117 CEST53634568.8.8.8192.168.2.3

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Oct 25, 2021 15:00:18.588891983 CEST192.168.2.38.8.8.80x2572Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:25.265844107 CEST192.168.2.38.8.8.80xddc5Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:33.179090977 CEST192.168.2.38.8.8.80xb3c1Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:39.739573956 CEST192.168.2.38.8.8.80x1748Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:46.357811928 CEST192.168.2.38.8.8.80x1f29Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:52.953521967 CEST192.168.2.38.8.8.80x197bStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:59.429028988 CEST192.168.2.38.8.8.80x7254Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:06.766701937 CEST192.168.2.38.8.8.80x3bedStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:13.559650898 CEST192.168.2.38.8.8.80x2034Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:20.732178926 CEST192.168.2.38.8.8.80xd849Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:26.752331018 CEST192.168.2.38.8.8.80x2beaStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:32.805299044 CEST192.168.2.38.8.8.80x2b1bStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:38.778913975 CEST192.168.2.38.8.8.80x691Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:44.719530106 CEST192.168.2.38.8.8.80x722fStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:50.603530884 CEST192.168.2.38.8.8.80xbc8Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:56.568674088 CEST192.168.2.38.8.8.80xae4fStandard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:02:02.515014887 CEST192.168.2.38.8.8.80xe622Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:02:08.877588034 CEST192.168.2.38.8.8.80xbe5Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:02:14.861913919 CEST192.168.2.38.8.8.80x3887Standard query (0)kamuchehddhgfgf.ddns.netA (IP address)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Oct 25, 2021 15:00:18.610142946 CEST8.8.8.8192.168.2.30x2572No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:25.286725044 CEST8.8.8.8192.168.2.30xddc5No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:33.199758053 CEST8.8.8.8192.168.2.30xb3c1No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:39.756234884 CEST8.8.8.8192.168.2.30x1748No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:46.376326084 CEST8.8.8.8192.168.2.30x1f29No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:52.973690987 CEST8.8.8.8192.168.2.30x197bNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:00:59.446767092 CEST8.8.8.8192.168.2.30x7254No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:06.785360098 CEST8.8.8.8192.168.2.30x3bedNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:13.577939034 CEST8.8.8.8192.168.2.30x2034No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:20.750567913 CEST8.8.8.8192.168.2.30xd849No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:26.772399902 CEST8.8.8.8192.168.2.30x2beaNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:32.823734999 CEST8.8.8.8192.168.2.30x2b1bNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:38.797635078 CEST8.8.8.8192.168.2.30x691No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:44.740048885 CEST8.8.8.8192.168.2.30x722fNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:50.622005939 CEST8.8.8.8192.168.2.30xbc8No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:01:56.589706898 CEST8.8.8.8192.168.2.30xae4fNo error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:02:02.535309076 CEST8.8.8.8192.168.2.30xe622No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:02:08.895885944 CEST8.8.8.8192.168.2.30xbe5No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)
                                                            Oct 25, 2021 15:02:14.881863117 CEST8.8.8.8192.168.2.30x3887No error (0)kamuchehddhgfgf.ddns.net37.0.10.22A (IP address)IN (0x0001)

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:15:00:07
                                                            Start date:25/10/2021
                                                            Path:C:\Users\user\Desktop\CV.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\CV.exe'
                                                            Imagebase:0xf50000
                                                            File size:707072 bytes
                                                            MD5 hash:5D9FED85F31D020568F166E6291CBE7B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.304747743.0000000003682000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.304713233.0000000003661000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.305068384.0000000004661000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:15:00:14
                                                            Start date:25/10/2021
                                                            Path:C:\Users\user\Desktop\CV.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\CV.exe
                                                            Imagebase:0xd00000
                                                            File size:707072 bytes
                                                            MD5 hash:5D9FED85F31D020568F166E6291CBE7B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Reputation:low

                                                            General

                                                            Start time:15:00:26
                                                            Start date:25/10/2021
                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                            Imagebase:0x740000
                                                            File size:707072 bytes
                                                            MD5 hash:5D9FED85F31D020568F166E6291CBE7B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.337548650.0000000003E71000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.336966221.0000000002E71000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.337007727.0000000002E92000.00000004.00000001.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 56%, ReversingLabs
                                                            Reputation:low

                                                            General

                                                            Start time:15:00:28
                                                            Start date:25/10/2021
                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                            Imagebase:0x770000
                                                            File size:707072 bytes
                                                            MD5 hash:5D9FED85F31D020568F166E6291CBE7B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.349313749.0000000002E11000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.349379459.0000000003E11000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.348554360.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >